• Access to security log in Windows 2000

    In my company we want to give full access to the security log of Windows 2000 only to the security manager, but we want to give only read access to the support people, Is there how to do it ?

    Feaxavier0 pointsBadges:
  • Security Banner at SAP Login

    All, I'm required to create a window to come up at login. This window contains a Security warning that the user must be required to click through. This window should work similar to the first logon "License" screen, but should come up every time a user logs in. The "System message" will not work...

    Pennet0 pointsBadges:
  • telnet router

    hi all, i have a cisco 3661 router.when i telnet the router from win NT machine which itself is a DNS there is a problm .when i telnet using ip address it does so but when i telnet using the name assigned to it doesnot.i can see the name of the router when i run "show run".is there the problm in...

    Xevier0 pointsBadges:
  • Spam guards

    Hi guys...u all know abt the problem with spam these days...I have just abt had it now, I have tried everything but there still a small percentage of spam coming through, I am having using an exchange server and McAfee as the virus guard, any sugestions on a good spam guard to go for?

    Adrian350 pointsBadges:
  • Restricted access to win XP professional

    I have a small WORKGROUP with windows 2000 server and 5 windows XP professional systems. All computers can read/write each other. Now I want to make one XP client secure/restric access, so that no other computer can access that except only other XP computer. How can I do that? Please advise. Thanks...

    BinooDas123410 pointsBadges:
  • VPN connection problem from WinXP to Windows Server 2003.

    I have configured a Windows Server 2003 to accept incoming VPN-connections behind a firewall. The firewall forwards port 1723 to the server. When I try to connect with a WinXP Pro desktop via the internet (the server has a public IP at the firewall), I get an errormessage (number 691) that the...

    JuhaTa0 pointsBadges:
  • Network Design Development

    How do I create a network design for a large business? The following is the scenario and the requirements, I need so help please. An Ice Cream Factory with 5 stores, citywide and has connectivity to the corporate office in Austin. Each store is responsible for maintaining its inventory locally, but...

    ITgirl840 pointsBadges:
  • who integrated Domino Admin Server Monitoring in CA Unicenter NSM Console?

    We only want one monitor in our IT production environment: CA Unicenter NSM Console. Therfore we want that all irregular events of Domino Administrator Server Monitoring are sent to CA Unicenter NSM Console. Has anybody done this or can give hints or tips? Thanks a lot.

    Fred0 pointsBadges:
  • Firewall MIME content types

    Now and then I recieve complaintes that users can't access web content and it's because my firewall has blocked it based on content types such as the one today, application/vnd.ms.wms-hdr.asfv1 How can I determine if this MIME content is safe and if there are no known hacks so that I can remove the...

    JEAKINS0 pointsBadges:
  • Question about IT management software-2

    Hello, I am just wondering if anyone knows of some software avialable for IT departments, that say is accessable to users through a company intranet site where a user can go in and log an issue or problem with thier system which goes into a database, then once the issue is resolved the user can go...

    Natethegreat0 pointsBadges:
  • security related

    What is Digital Signature? I need the procedure and algorithm of it. If you have any sample program please send it to me.

    Sharan0 pointsBadges:
  • Recent security technology development

    Hi all, Nice to meet you all. Does anyone can give me ideas on what's hot in the last 3 months in the security technology development? Thanks.

    StanleyC0 pointsBadges:
  • Network Access Controls

    Hello, Many times an unknown node attaches themselves to our internal LAN with out the proper controls and then spreads a virus or has malware potential. It is not so much a problem with domain members, but rather at Layer 2-3 where the DHCP connection occurs and any machine can access the network....

    Surfnturf0 pointsBadges:
  • System utility require:to monitor real time user activiry

    does anyone know about the utility which can provide realtime monitoring of user activity.. i.e any creation or deletion of file on network resources, try to take access of another's system/ share etc

    JatinVS0 pointsBadges:
  • Mainframe security / Racf

    My first time on ITKE , so please forgive, but why do I not see any RACF/Top Secret/ACF2 related issues? It should be under security, or not ? Thanks Pieter

    Swannie0 pointsBadges:
  • Network UserID Creation/Change

    Looking for White Papers, Best Practices, Your Practice...on UserIDs What should a Network UserID look like for strong security? I don't believe it should contain any part of the user's legal name. Agree? So what do you use to create a UserID? Should a user be able to change their UserID? Thanks...

    GPHdo60 pointsBadges:
  • Security Philosphy

    I would be interested and knowing if other companies have a defined and documented security philosophy for IT security and how you implemented it.

    SAPStarr0 pointsBadges:
  • Educating Clients regarding attachments

    With all the viruses/worms/malware being forwarded to email accounts, we are having a hard time convincing some of our clients that opening attachments without thinking about it is BAD. We strip off attachments and have gotten heat from a number of people. I am sure we are not an isolated case and...

    McR1der0 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following