• Shares Baseline Security Information

    Hello, I use the Microsoft Baseline Security Analyser 2.0 to retrive information about shares in some local servers. I can not understand the diference between the information give in the report, about authorizations in the column Share ACL and Directory ACL. If some one can help me, Thank you PPG

    ITAudit0 pointsBadges:
  • remote office

    I'm having trouble creating subnets for my remote office. I have a sonicwall at each office creating a vpn between locations. My server is at the main location and it does the dhcp and dns. I have no trouble setting up the vpn but not sure if I have correct settings I need in Active Directory. Any...

    Winger90760 pointsBadges:
  • Detection of ActiveX & other Mobile code

    Hi ! I am trying to extend the functionality of a squid-based proxy to filter out ActiveX, JavaScripts and mobile code in general, from the web pages users will download. I am trying to make it an "intelligent" filter, in the sense of not just plainly removing the <OBJECT> tags from the page,...

    Hedgehog0 pointsBadges:
  • Are FIPS and other NIST InfoSec standards and criteria accepted commercially?

    I know that information security decision makers and policy makers within the Federal government rely heavily on standards such as FIPS certification from the National Institute of Standards and Technology (NIST). How much weight is there placed on a product or service that has met certification...

    NAT19710 pointsBadges:
  • Secure File Transfer for Mainframe systems

    I would like to transfer files from Unix machine to Mainframe system (using Unix machine as client). The transfer process need to be secure (ie. data sent thro network should be encrypted using 128-bit encryption algorithm). I came to understand that SFTP server is not available for Mainframe...

    Tsdnesh0 pointsBadges:
  • NTFS permissions

    I have a Ntfs folder on windows2000 advanced server.I want to set rights like users can't delete any files or folders from this folder.Same time they can able to save&changes in that folder. how can i do this.

    shivkumar10 pointsBadges:
  • IT Tech Assistant/No Admin Rights

    I have hired a new IT support person, and I wanted to give him access to restart services ex: Print services, in my absense which occasionally needs resetting. Is their a way to give someone strict access to only restart services?

    ESuazo0 pointsBadges:
  • Certificates

    I am pretty new to the 2003 Microsoft world, but I am NT 4 MCSE. My setup: 2 W2K3 DC's 1 Exchange 2K3 member server 1 W2K3 member server--web server about 60 users--single domain some of my users want to use Outlook Web Access to get their mail from home (approx. 10-15) Everything is set up and...

    TheVyrys0 pointsBadges:
  • Expired passwords

    Is there a report or a file to query on the ISeries that will list users whose passwords are about to expire?

    Debjam0 pointsBadges:
  • Printer problem plz help

    having a printer ,connected to a LAN but it not being a net work print just it's connected to one of the hosts on the net work and it's shared ,then the problem with its is that at anytime it prints by it self ,and it prints some sort of code in the head of a page ,and it will print till the...

    Gistone0 pointsBadges:
  • Telnet into PIX

    I currently have a PIX 515 where only one server can telnet into it. I am going to replace that computer. I would like to be able to telnet into the PIX from any workstation on segment 192.168.1.0. Will you please tell me the correct entry to put in the configuration.

    Jtennyson0 pointsBadges:
  • Consolidated Security Product/Approach? What about layered approach?

    Hi Punnet, I'm a It Director at lasrge Media firm in NY. Looking at the security overhaul in the recent months and business looking to cxonsolidate the offices enviornment the talk of the town is to have ALL IN One device which does Firewall,IDS,VPN etc. I thought layerd security approach was the...

    Networksecure10 pointsBadges:
  • Demilitarized zone using iptables?

    Hi, I'm the Assistant Editor for SearchEnterpriseLinux.com. One of our users, "ruhi," posted the following question. Can you help? "I have to plan and design a demilitarized zone using iptables. How can I do this?" You can post your answer here on ITKE, or reply to...

    AmyKucharik870 pointsBadges:
  • Exchange 2K IM Server Question

    I have setup a test lab for E2K IM. I installed a separate Win2K server in the test AD Domain; all the latest updates etc. Installed the IM portion of the installation. I ran SP3 on the new server and and reapplied SP3 on the current E2K server that hosts email only. In SM i setup the new virtual...

    Delebute20040 pointsBadges:
  • Changing local admin password

    A few months agon I came across a software where you can change the local admins password on several machines at once. It basically grabs a list from active directory of the computers and allows you to change the password. For the life of me I can't remember where I saw it...or who made it...Does...

    Earthbound4u0 pointsBadges:
  • City Based Website Portal

    I am working on project of starting a city based Portal. and was looking for ideas, which can make it success. the city is an industrial hub of Punjab (a state in india) Please suggest the contents.

    Andesh0 pointsBadges:
  • SYSVOL Sharing across network concern

    Good morning to all. First off, let me thank everyone for their past help and support I have received from this search2000 group. I have a concern about a folder being shared across my network called SYSVOL. I know it is related to the Domain controller and maybe for scripts that have been added....

    ESuazo0 pointsBadges:
  • Automated Remote Login to Different AD Domain

    I need to a way to run a script and connect to a remote computer in another AD Domain. I have a User/Password for use in the remote domain. I need a script that is the equivalent of: 1. Start | Run | \ServerName 2. In "Enter Network Password" dialog: Connect As: DomainServerName Password: ********...

    PaperMaker0 pointsBadges:
  • Indentifying end users with weak passwords

    I am looking for a product that I can use to identify end users that log into our network (NT4.0 going to Active Directory this summer) using weak passwords. Can anyone help?

    CalendarGirl0 pointsBadges:
  • problem with exchange sync and pocket pc 2003

    i have a HP iPAQ hx4700 with Pocket PC 2003 on it that connect to the internet through my phone cellolar (with bluethooth connection), i want to sync all my contact and my calender on my ipaq to my exchange small buisness server 2003 through the internet,my server connect to the internet and are...

    Drorbenyosef5 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following