• NTFS permissions

    I have a Ntfs folder on windows2000 advanced server.I want to set rights like users can't delete any files or folders from this folder.Same time they can able to save&changes in that folder. how can i do this.

    shivkumar10 pointsBadges:
  • IT Tech Assistant/No Admin Rights

    I have hired a new IT support person, and I wanted to give him access to restart services ex: Print services, in my absense which occasionally needs resetting. Is their a way to give someone strict access to only restart services?

    ESuazo0 pointsBadges:
  • Certificates

    I am pretty new to the 2003 Microsoft world, but I am NT 4 MCSE. My setup: 2 W2K3 DC's 1 Exchange 2K3 member server 1 W2K3 member server--web server about 60 users--single domain some of my users want to use Outlook Web Access to get their mail from home (approx. 10-15) Everything is set up and...

    TheVyrys0 pointsBadges:
  • Expired passwords

    Is there a report or a file to query on the ISeries that will list users whose passwords are about to expire?

    Debjam0 pointsBadges:
  • Printer problem plz help

    having a printer ,connected to a LAN but it not being a net work print just it's connected to one of the hosts on the net work and it's shared ,then the problem with its is that at anytime it prints by it self ,and it prints some sort of code in the head of a page ,and it will print till the...

    Gistone0 pointsBadges:
  • Telnet into PIX

    I currently have a PIX 515 where only one server can telnet into it. I am going to replace that computer. I would like to be able to telnet into the PIX from any workstation on segment 192.168.1.0. Will you please tell me the correct entry to put in the configuration.

    Jtennyson0 pointsBadges:
  • Consolidated Security Product/Approach? What about layered approach?

    Hi Punnet, I'm a It Director at lasrge Media firm in NY. Looking at the security overhaul in the recent months and business looking to cxonsolidate the offices enviornment the talk of the town is to have ALL IN One device which does Firewall,IDS,VPN etc. I thought layerd security approach was the...

    Networksecure10 pointsBadges:
  • Demilitarized zone using iptables?

    Hi, I'm the Assistant Editor for SearchEnterpriseLinux.com. One of our users, "ruhi," posted the following question. Can you help? "I have to plan and design a demilitarized zone using iptables. How can I do this?" You can post your answer here on ITKE, or reply to...

    AmyKucharik420 pointsBadges:
  • Exchange 2K IM Server Question

    I have setup a test lab for E2K IM. I installed a separate Win2K server in the test AD Domain; all the latest updates etc. Installed the IM portion of the installation. I ran SP3 on the new server and and reapplied SP3 on the current E2K server that hosts email only. In SM i setup the new virtual...

    Delebute20040 pointsBadges:
  • Changing local admin password

    A few months agon I came across a software where you can change the local admins password on several machines at once. It basically grabs a list from active directory of the computers and allows you to change the password. For the life of me I can't remember where I saw it...or who made it...Does...

    Earthbound4u0 pointsBadges:
  • City Based Website Portal

    I am working on project of starting a city based Portal. and was looking for ideas, which can make it success. the city is an industrial hub of Punjab (a state in india) Please suggest the contents.

    Andesh0 pointsBadges:
  • SYSVOL Sharing across network concern

    Good morning to all. First off, let me thank everyone for their past help and support I have received from this search2000 group. I have a concern about a folder being shared across my network called SYSVOL. I know it is related to the Domain controller and maybe for scripts that have been added....

    ESuazo0 pointsBadges:
  • Automated Remote Login to Different AD Domain

    I need to a way to run a script and connect to a remote computer in another AD Domain. I have a User/Password for use in the remote domain. I need a script that is the equivalent of: 1. Start | Run | \ServerName 2. In "Enter Network Password" dialog: Connect As: DomainServerName Password: ********...

    PaperMaker0 pointsBadges:
  • Indentifying end users with weak passwords

    I am looking for a product that I can use to identify end users that log into our network (NT4.0 going to Active Directory this summer) using weak passwords. Can anyone help?

    CalendarGirl0 pointsBadges:
  • problem with exchange sync and pocket pc 2003

    i have a HP iPAQ hx4700 with Pocket PC 2003 on it that connect to the internet through my phone cellolar (with bluethooth connection), i want to sync all my contact and my calender on my ipaq to my exchange small buisness server 2003 through the internet,my server connect to the internet and are...

    Drorbenyosef5 pointsBadges:
  • What law enforcement to contact if an intrusion is discovered?

    New regulations concerning unauthorized access to sensitive customer information talks about contacting law enforcement, if applicable. While hoping it is a plan that I never need, in an intrusion responce plan, where sensistive customer information may have been accessed and you are required to...

    Tmoac20 pointsBadges:
  • Secure the qsecofr profile

    We are looking for a way to secure the qsecofr profile, more specifically, limit who can change the password. Certain applications on our system require intermittent use of the qsecofr profile, by users with SECADM and ALLOBJ, making it difficult to keep Qsecofr secure when mutable users can change...

    Gunfighter60 pointsBadges:
  • Resticting Members of BuiltinAdministrator to just be able to create Domain Trust

    In windows 2000/2003, Can we restrict a BuiltinAdministrators member to have just enough rights so that he/she can only create/delete domain Trust. The requirement that we have is to be programmatically create trust with all the domains in a given forest. The other part of the requirement is to...

    EternalLearner0 pointsBadges:
  • A graduate student in need of help – I would like to know your professional opinion on information security.

    I am graduate student at the School of Information Studies at Syracuse University and am conducting research to gather empirical data on the subject of information security. My goal is to gain a better understanding of what IT professionals believe is an adequate level of information / network...

    Amolet0 pointsBadges:
  • Securing Function Key four (F4)

    How best to Control or limit Access to the Function Key Four (F4) that displays the MAJOR Menu from QSYS library?

    JoyceTomR0 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following