We are about to scrap several old copy machines. I know they have hard drives in them. Should they be removed, wiped or what are normal company procedures for destroying any potential data on it before decommissioning it.
Answer Question | September 21, 2010 3:17 PM
Copy Machine, HARD drive, Hard drives, printer security, Security in 2010, Windows
I have a client with Windows Vista Ultimate and need to connect to their machine. They say they have a firewall and do not know where it is located. How can I share the users screen to help them fix an issue? Free is preferable.
Answer Question | October 11, 2010 6:12 PM
Firewalls, Remote connection, Security in 2010, Windows firewall, Windows Vista, Windows Vista security and patches, Windows Vista Ultimate
How can I secure a Windows XP workstation that is open to port 80 and hosting a website using IIS? The box is on the DMZ of our firewall for the time being. We will probably move it inside the firewall and open port 80 to it shortly.
Answer Question | September 28, 2010 6:10 PM
DMZ, Firewalls, IIS, Port 80, Security in 2010, Windows XP, Windows XP Security
We have about 10 IP addresses trying to cause a DDOS attack on our organization. As soon as I block the addresses in the firewall another batch takes its place. This has been ongoing for about 10 hours. How can I stop this attack without changing my IP addresses?
Answer Question | September 21, 2010 6:10 PM
Attacker IP blocking, DDOS, Firewalls, IP blocking, Security in 2010, Windows, Windows Server 2008 R2, Windows Server Security
This week’s IT book giveaway is for the Microsoft Windows 7 Administrator’s Reference: Upgrading, Deploying, Managing, and Securing Windows 7. Interested? All you need to do is answer one of the questions below and post the link to your answer in the discussion area of this question. Multiple answers mean multiple chances to win! Resizing [...]
Answer Question | January 8, 2011 4:09 PM
Contests, Giveaways, IT Books, NAS, Networking, Security in 2010, Windows 7, Windows 7 in 2010, Windows Server 2003
Is there a way to protect a file folder on a Windows server 2003 from everyone including domain administrators? I want this confidential file to only be accessible to the President and I. How can I do this?
Answer Question | September 22, 2010 3:43 PM
Confidentiality, File Protection, Security in 2010, Windows, Windows Server 2003, Windows Server 2003 security, Windows Server Security
How do I create an ACL for: Allow inbound HTTP requests to the www.yzcorp server. Add info: The www.yzcorp.com website at 10.0.1.2 is registered with the public DNS system at IP address 188.8.131.52 permit tcp any 184.108.40.206 eq www is not working.
Answer Question | December 16, 2010 1:21 PM
Access Control List, ACL, ACL Manager, Active Directory, Cisco, Packet Tracer, Security in 2010, Servers
How can we use Windows 2008’s Network Access Control to limit intern’s computers from getting to the Internet? Where is this feature setup and do we need a client on the computers or does AD take care of this?
Answer Question | August 31, 2011 3:14 PM
NAC, Network Access Control, Security in 2010, Windows, Windows Server 2008, Windows Server 2008 R2, Windows Server 2008 R2 Support
How can I set up a NAS device on my network? Will the users access files directly on it? Do we need to set security here or will the device be an extension of one of my Windows servers using it’s security? What is common practice?
Answer Question | September 21, 2010 3:11 PM
NAS, Network Access Storage device, Network Attached Storage, Network Drive, Security in 2010, Windows
In honor of security month here at IT Knowledge Exchange, we’re giving away resources to help you pass the CompTIA Security+ exam with flying colors! What do you have to do to get this great resource? All you need to do is ask or answer two Security in 2010 questions*. Put the links to the [...]
Answer Question | September 20, 2010 8:59 PM
CompTIA, CompTIA certification, CompTIA Security+, IT career development, IT certification, IT certification and training, Security in 2010
Hello, I am auditing a client and would like to understand if there is any risk with the following scenario. We are auditing the periodic review of system privilege for payroll/HR system. The review is only done by one individual. This individual is the system owner and the system administrator. I am trying to understand [...]
Answer Question | September 16, 2010 6:41 PM
Audit Policy, Auditing, Auditing (systems operations), Security in 2010, System administrator, Systems administration
Running Exchange 2005 is there a way to block specific IP ranges from our smtp server? Spammers keep trying to send spam and brute force passwords locking users out.
Answer Question | September 17, 2010 5:07 PM
Attacker IP blocking, Exchange, Exchange 2005, Exchange security, IP blocking, IP range, Security in 2010, SMTP
What exactly is Network Access Control in Windows 2008 R2? How can we implement it?
Answer Question | November 23, 2010 4:48 PM
NAC, Network Access Control, Security in 2010, Windows Server 2008, Windows Server 2008 R2, Windows Server 2008 R2 Support
Where are the registry files stored in Windows 2003? Can they be modified offline with a boot disk? Can we backup and restore them offline as well? If so is this a security issue? Can someone inject a registry entry with a username and password?
Answer Question | August 26, 2011 3:32 PM
Boot disk, Registry editor, Registry settings, Security in 2010, Windows, Windows Server 2003
We need to capture network packets for analysis on our Windows server 2003. How can we achieve this and is there a guide to analyzing this data?
Answer Question | September 16, 2010 3:29 PM
Data analysis, Network Packet, Packet Analyzer Software, Packet analyzers, Packets, Security in 2010, Windows, Windows Server 2003
I forgot my password to my pc but I am able to login with the fingerprint login. I want to change/remove the password but it asks me for the current password to do this. I have administrator rights on my pc. I am using vista sp2.
Answer Question | December 14, 2011 4:22 AM
Administrator password, Fingerprint authentication, Security in 2010, Windows password recovery, Windows Vista, Windows Vista Home Premium
We have about 50 computers that already have Macfee 8.7 on them. We just installed an EPO server to manage all of our antvirus clients. How can we add the existing computers and the rest of the domain to the EPO server?
Answer Question | September 16, 2010 8:15 PM
Antivirus, EPO server, McAfee, McAfee Antivirus 8.7, McAfee Security Center, Security in 2010
1. We are running a terminal server on a Windows 2000 server. It has IIS on it. Someone was able to connect to the system, install some sort of SQL exploit tool as well as a mail blaster. How did this happen and how can we prevent it from happening again?
Answer Question | September 17, 2010 3:42 PM
Dell PowerEdge, Hack, Hackers, IIS, Security in 2010, SQL, Terminal Server, Windows, Windows Server 2000, Windows Terminal Server
A recent question from the community regarding forwarding work emails to a third party account such as Gmail spurred a reaction of general distaste. What are your thoughts on the IT risks posed by melding the personal with professional, whether it be through social networking sites, smart phones, or email forwarding? (Check out member DavidVasta’s [...]
Answer Question | September 22, 2010 2:33 PM
Email forwarding, IT risk, IT risk assessment, Open IT Forum, Security in 2010
Hi, I would like to implement an extendard access-list on a router A which allows IP access to a host in router B. e.g. host A from network A can only access host B fom network B. No one else can access host A from the network except host B -vicer versa- I woul like [...]
Answer Question | September 15, 2010 1:11 AM
Extended Access-list, IP address, Network access, Network Access Policy, Routers, Security in 2010