• Security COncern, Files deleted from Server

    Good morning to all, and hope everyone is dooing well. I have a security issue, and need help solving this. Someone in my company within Engineering staff deleted an entire group of folders. Unfortunately it was on a project that ended, and it was discovered this morning. I have luckily a back up...

    ESuazo0 pointsBadges:
  • Data Visibility in RBAC and Rule-based systems issues

    Actually, I have two questions: 1) are there known solutions of how to control access to data ( database records ) in RBAC system where business policy states, e.g., that data belonds to the users in certain geographical are may be viewed by users located in the same area? This is quite actual...

    M3poulin0 pointsBadges:
  • Moving files without losing rights

    I am upgrading my network from NT to 2003. I am trying to move folders and files without losing any user's rights or access from a NT 40 domain to a Windows 2003 domain. How do I do this?

    SCAquarium0 pointsBadges:
  • DOS attack, DNS question

    My question has two parts, first: today at the place where i work we lost the internet, and after checking the firewall (sonicwall, this is a non profit organization so they cant afford the best stuff) i discovered it was more than likely a DOS attack. nobody could access the internet, and i could...

    KJC48550 pointsBadges:
  • Moving files without losing rights-2

    I am upgrading my network from NT to 2003. I am trying to move folders and files without losing any user's rights or access from a NT 40 domain to a Windows 2003 domain. How do I do this?

    SCAquarium0 pointsBadges:
  • Access to security log in Windows 2000

    In my company we want to give full access to the security log of Windows 2000 only to the security manager, but we want to give only read access to the support people, Is there how to do it ?

    Feaxavier0 pointsBadges:
  • Security Banner at SAP Login

    All, I'm required to create a window to come up at login. This window contains a Security warning that the user must be required to click through. This window should work similar to the first logon "License" screen, but should come up every time a user logs in. The "System message" will not work...

    Pennet0 pointsBadges:
  • telnet router

    hi all, i have a cisco 3661 router.when i telnet the router from win NT machine which itself is a DNS there is a problm .when i telnet using ip address it does so but when i telnet using the name assigned to it doesnot.i can see the name of the router when i run "show run".is there the problm in...

    Xevier0 pointsBadges:
  • Spam guards

    Hi guys...u all know abt the problem with spam these days...I have just abt had it now, I have tried everything but there still a small percentage of spam coming through, I am having using an exchange server and McAfee as the virus guard, any sugestions on a good spam guard to go for?

    Adrian350 pointsBadges:
  • Restricted access to win XP professional

    I have a small WORKGROUP with windows 2000 server and 5 windows XP professional systems. All computers can read/write each other. Now I want to make one XP client secure/restric access, so that no other computer can access that except only other XP computer. How can I do that? Please advise. Thanks...

    BinooDas123410 pointsBadges:
  • VPN connection problem from WinXP to Windows Server 2003.

    I have configured a Windows Server 2003 to accept incoming VPN-connections behind a firewall. The firewall forwards port 1723 to the server. When I try to connect with a WinXP Pro desktop via the internet (the server has a public IP at the firewall), I get an errormessage (number 691) that the...

    JuhaTa0 pointsBadges:
  • Network Design Development

    How do I create a network design for a large business? The following is the scenario and the requirements, I need so help please. An Ice Cream Factory with 5 stores, citywide and has connectivity to the corporate office in Austin. Each store is responsible for maintaining its inventory locally, but...

    ITgirl840 pointsBadges:
  • who integrated Domino Admin Server Monitoring in CA Unicenter NSM Console?

    We only want one monitor in our IT production environment: CA Unicenter NSM Console. Therfore we want that all irregular events of Domino Administrator Server Monitoring are sent to CA Unicenter NSM Console. Has anybody done this or can give hints or tips? Thanks a lot.

    Fred0 pointsBadges:
  • Firewall MIME content types

    Now and then I recieve complaintes that users can't access web content and it's because my firewall has blocked it based on content types such as the one today, application/vnd.ms.wms-hdr.asfv1 How can I determine if this MIME content is safe and if there are no known hacks so that I can remove the...

    JEAKINS0 pointsBadges:
  • Question about IT management software-2

    Hello, I am just wondering if anyone knows of some software avialable for IT departments, that say is accessable to users through a company intranet site where a user can go in and log an issue or problem with thier system which goes into a database, then once the issue is resolved the user can go...

    Natethegreat0 pointsBadges:
  • security related

    What is Digital Signature? I need the procedure and algorithm of it. If you have any sample program please send it to me.

    Sharan0 pointsBadges:
  • Recent security technology development

    Hi all, Nice to meet you all. Does anyone can give me ideas on what's hot in the last 3 months in the security technology development? Thanks.

    StanleyC0 pointsBadges:
  • Network Access Controls

    Hello, Many times an unknown node attaches themselves to our internal LAN with out the proper controls and then spreads a virus or has malware potential. It is not so much a problem with domain members, but rather at Layer 2-3 where the DHCP connection occurs and any machine can access the network....

    Surfnturf0 pointsBadges:
  • System utility require:to monitor real time user activiry

    does anyone know about the utility which can provide realtime monitoring of user activity.. i.e any creation or deletion of file on network resources, try to take access of another's system/ share etc

    JatinVS0 pointsBadges:
  • Mainframe security / Racf

    My first time on ITKE , so please forgive, but why do I not see any RACF/Top Secret/ACF2 related issues? It should be under security, or not ? Thanks Pieter

    Swannie0 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following