• Strong security measures (hardware and software) for data integrity

    Please help me in choosing how subject would be achieved to defend against hacker attack – especially against information theft and intruders. Critically compare and contrast the different methods (why should i choose certain than others) available...I need it for remote sites and main office.

    DigitalDrop40 pointsBadges:
  • Stopping EMF radiation from a server room for security

    I want to shield one room against EMF emitted by the computers from escaping the room. This is for security of the data, not some crazy health craze. Will a simple faradays cage suffice? Should I ground the cage? What about the power lines and LAN lines and phone lines that could potentially emit...

    bing135120 pointsBadges:
  • Security management

    How a problem of a computer losing its system security can be solved?

    25782515 pointsBadges:
  • Confidential Information Theft

    I suspect a company who is managing my business stealing or at least know private information which they are not supposed to do. Private memo and things. Is there a way for me to detect how they are doing it. Want to catch then red handed.

    rising12510 pointsBadges:
  • SOX Vulnerability Assessment & Audit Prodcuts

    Are there reviews showing SOX Vulnerability Assessment & Audit products? NetIQ seems to show up in a number of security categories(SOX, Mtg, Assessment, Patching), how does it compare to the other products? Thanks for any help & pointers you can provide! Cheers

    WintelEngr0 pointsBadges:
  • vpn through s-box firewall of checkpoint

    i'm try to create a vpn from the internet to my "small buisness server 2003" that act as vpn server without any luck, if i try to connect to my server from the internal network it's work just fine, iv'e mapped the correct ports according to the microsoft article that say to forward port 1723 and 47...

    Drorbenyosef5 pointsBadges:
  • Developing an antivirus (efficient):for Windows:Using VC++

    I am working on a Project for making an antivirus.I have 2 other project parteners. But we don't have an guidance on how to develop the antivirus.Plz give me any relevent Information on this subject.(like components of AV,Algorithms(efficient),methods,general detection & removal of virus).(Also...

    4238830 pointsBadges:
  • Developing an antivirus (efficient):for Windows:Using VC++-2

    I am working on a Project for making an antivirus.I have 2 other project parteners. But we don't have an guidance on how to develop the antivirus.Plz give me any relevent Information on this subject.(like components of AV,Algorithms(efficient),methods,general dection & removal of virus).(Also...

    4238830 pointsBadges:
  • Internet Explorer vs. Firefox

    Hello, I'm the Assistant Editor on SearchWindowsSecurity.com. I'm looking to start a discussion about what browser people are using and why. Also, is anyone considering switching from IE to Firefox, or are your plans to stay with IE? Here's some food for thought... As of Feb. 2005, an estimated 35...

    LMullen0 pointsBadges:
  • Open IT Forum: How is your company protecting its data from being attacked?

    In his latest blog post on IT Compliance Advisor, independent security consultant Kevin Beaver talked about five ways your company can help prevent a data breach. His list included: 1. Having the right people on board 2. Really understand the risk 3. Approach management and corporate compliance...

    Michael Tidmarsh34,110 pointsBadges:
  • connecting the 5th and 7th floosr of a building

    Hi, Everybody My network covers the 5 th floor of an office building, and now we expanding to the 7th floor (a half-dozen users. All the servers and telecom closet are on the 5th floor and I have to provide network services to the users on the 7th floor. I would like to have the opunion of this...

    Senomango0 pointsBadges:
  • IFS on Iseries

    After sharing a folder in the IFS i can access it via the windows network, I can paste a file in the folder but cannot delete it, I get a message "Cannot delete :There has been a sharing violation the source destination file may be in use" I have stoped & started the netserver & added my user in...

    Jungojo0 pointsBadges:
  • SPCAUT = *NONE

    What can you do on the command line if you have it but have SPCAUT = *NONE. I'm just trying to understand the risks and the benefit of having it = *NONE. My understanding is that there is no risk as you cannot do anything, but if that is the case, can I set the LMTCAP = *YES?

    Guy553435 pointsBadges:
  • Active Dir. Web Based Password Reset Tool?

    We run a native 2003 Active Directory. We have many remote users who have an AD account (without an Exchange account). Quite often we get emailed from users who are requesting password resets, or account unlocks (since we have a 5-try account lockout policy in effect on the domain). Obviously,...

    GregNottage0 pointsBadges:
  • VIRUS Scan

    Using the command line prompt in windows (the black box) which command i can use to scan my machine for viruses without using any virus scan tools ?

    Majedhamad0 pointsBadges:
  • about virus

    how viruses attack windows os? why viruses does not attack linus os?

    Sathiiish0 pointsBadges:
  • Open IT Forum: What are your cloud security concerns for 2011?

    Everyone has their own reasons for not wanting to experiment in the cloud, but more and more the enterprise is trusting mission critical applications to the cloud. What are your major security concerns for 2011 regarding the cloud, if any? How have those concerns changed or evolved since 2010?...

    MelanieYarbrough6,345 pointsBadges:
  • reusedlt *yes

    Hi, Has reusedlt *yes behavior changed with V5R3? When I add a record to a PF that is reusedlt *yes in V5R2 is uses a record that has been deleted, however when i do the same thing on a V5R3 system it adds a new record rather than re-use one. Anyone run into this before? Thanks, Luis

    Xixones0 pointsBadges:
  • One shared My Documents Folder for all users

    How can I set up a Windows workstation that is used by many people, who are now using a group logon, to save files to one My Documents folder if they are forced to log on inidividually? I need to be able to track whom does what and when but cannot do it with group logon and the Program Manager...

    Radsie5 pointsBadges:
  • Slow File sharing access in Win 98

    Actually I have 2 questions: I have a small workgroup of 3 XP Pro systems, 2 win98 systems, 1 win 2000 server and a 16 port ethernet switch(100mbps). I have enabled the ICS in the server and each compter can access files/printers and internet with the help of DHCP. 1) When I access the win98...

    BinooDas123410 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following