• What law enforcement to contact if an intrusion is discovered?

    New regulations concerning unauthorized access to sensitive customer information talks about contacting law enforcement, if applicable. While hoping it is a plan that I never need, in an intrusion responce plan, where sensistive customer information may have been accessed and you are required to...

    Tmoac20 pointsBadges:
  • Secure the qsecofr profile

    We are looking for a way to secure the qsecofr profile, more specifically, limit who can change the password. Certain applications on our system require intermittent use of the qsecofr profile, by users with SECADM and ALLOBJ, making it difficult to keep Qsecofr secure when mutable users can change...

    Gunfighter60 pointsBadges:
  • Resticting Members of BuiltinAdministrator to just be able to create Domain Trust

    In windows 2000/2003, Can we restrict a BuiltinAdministrators member to have just enough rights so that he/she can only create/delete domain Trust. The requirement that we have is to be programmatically create trust with all the domains in a given forest. The other part of the requirement is to...

    EternalLearner0 pointsBadges:
  • A graduate student in need of help – I would like to know your professional opinion on information security.

    I am graduate student at the School of Information Studies at Syracuse University and am conducting research to gather empirical data on the subject of information security. My goal is to gain a better understanding of what IT professionals believe is an adequate level of information / network...

    Amolet0 pointsBadges:
  • Securing Function Key four (F4)

    How best to Control or limit Access to the Function Key Four (F4) that displays the MAJOR Menu from QSYS library?

    JoyceTomR0 pointsBadges:
  • Is Windows security an afterthought?

    As the editor of SearchWindowsSecurity.com, I often speak with users about their Windows security responsibilities. One senior systems analyst in particular sent me an interesting note recently... To give you some background, he's in charge of configuring and administering desktop systems...

    RobynLorusso230 pointsBadges:
  • Biometrics

    I am looking for a method of utilizing a fingerprint reader on the iSeries. From an RPG program, I would like to prompt for input from a fingerprint reader and accept data from the reader. I do not want to utilize any 3rd party vendor software to do this.

    Rharding0 pointsBadges:
  • Yearly Data owner review listing

    Hi, We are currently on SAP 4.6C With SOX and other security settings we need to min. yearly prepare a user list per data owner, so that the data owner can review and sign-of on this. The data owner is determined per role. Now my question is, does anyone know a way of assigning a data owner to a...

    Sigrconi0 pointsBadges:
  • Regarding Previous Sign-on Date field as a result of DSPUSRPRF cmd.

    Is this field only updated when a person signs on via 5250 session? We have a client server environment where the programmers develop in delphi. Most all of our production user profiles are set to initial pgm *none and initial menu *signoff. But, in a fair amount of the user profiles I'm seeing...

    Davefett0 pointsBadges:
  • Security Forensics with Niksun or CA or Sandstorm

    Does any have experience recording and tracking traffic with playback using any of these venders. I am looking for the best solution to provide Forensics on my network. Niksun or CA or Sandstorm Also on a side not I am lookign for a product to do secure email delivery. Please let me know if anyone...

    Jclarkfl0 pointsBadges:
  • Congress to ban sale of SSNs for commercial purposes?

    According to articles in today's Washington Post and Wall Street Journal, Congress is considering legislation to ban the sale of Social Security Numbers for commercial purposes, unless individuals give their permission. The Post article went on to opine that there appears to be a growing bipartisan...

    InfoSafety75 pointsBadges:
  • Qsecurity Level 40

    I am currently running at Security level 40. Can you tell what my programmers will and will not be able to do at this level. I have reviewed the Security Reference manual, but I was looking for a list that would indicate what a programmer can or cannot do. Thanks, Alvin

    Ajennings0 pointsBadges:
  • MS Office Outlook 2003 Address book

    I use MS office outlook 2003 but this is not adding the e-mail addresses to the address book/contacts automatically when I reply to someone. This feature is available in Outlook express but I didn't find this feature in MSOO 2003. Is there any simple way I can add e-mail ids to contacts /address...

    BinooDas123410 pointsBadges:
  • CITRIX – How to Print outside LAN to OFF-Site printers

    I need your help in this scenerio! what are your 2 cents? Goal: To go to a FULL Citrix Enviroment, Aiming at Thin clients, maybe linux based Off-site: Offices connect through the internet, they have DSL/T1's. Right now they are using Citrix successfully. If they have a printer over there and they...

    Ocarmona0 pointsBadges:
  • Slow File sharing access in Win 98-2

    Actually I have 2 questions: I have a small workgroup of 3 XP Pro systems, 2 win98 systems, 1 win 2000 server and a 16 port ethernet switch(100mbps). I have enabled the ICS in the server and each compter can access files/printers and internet with the help of DHCP. 1) When I access the win98...

    BinooDas123410 pointsBadges:
  • NTFS permissions on Security Group

    Hi While adding users to a security group which has got NTFS permission on a folder, user doesn't get access without re-login. Is there any way to implement access permission without re-login after being added to group. Thanks Pramod

    PramodKT0 pointsBadges:
  • C:WINNTSYSTEM32SVCHOST.EXE svchost.exe-kwugroup, svchost.exe-k netsvcs, svchost.exe-k BITSgroup

    Dear All I have some meory issues and rang system scan with Norton, checked spyware, checked taskmanager servives and then downloaded very good tool called The Ultimate troubleshooter etc and now needs some guidance as to a number of instances of svchost.exe etc which have an extension after the...

    Jessica0 pointsBadges:
  • sync problem with outlook web access

    i have a sbs 2003 at my network and exchange work just fine from my internal lan and all the users accounts are get sync from the server, but unfortunately when users connect to theirs mailbox from outside the network through outlook web access their mailboxes are not getting synchronize from the...

    Drorbenyosef5 pointsBadges:
  • Systems to reduce Spyware, Adware and Malware into users PC

    Hi all, I would like to implement something to reduce the chances for users to be hit by Spyware, Adware and Malware while surfing the internet. What kind of systems would you recommend? Thanks

    1122330 pointsBadges:
  • Desktop to AS/400 encrypted communications

    We currently have many users connecting to multiple AS/400 servers using TCP/IP. The servers OS vary from V4R5 to V5R3. Several products are used to communicate through the network from the desktops to the different servers. We are looking for a solution that will encrypt the information being...

    Neverham0 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following