• layer 2 & layer 3 switch

    Hi All, what is the basic difference between layer 2 & layer 3 switch. how can configure layer 2 & layer3 managable switch

    Psharma11760 pointsBadges:
  • Internet Explorer vs. Firefox

    Hello, I'm the Assistant Editor on SearchWindowsSecurity.com. I'm looking to start a discussion about what browser people are using and why. Also, is anyone considering switching from IE to Firefox, or are your plans to stay with IE? Here's some food for thought... As of Feb. 2005, an estimated 35...

    LMullen0 pointsBadges:
  • Uninstallation of Norton WMI update

    Respected recipient, I am currently having a trouble in uninstalling Norton anti-virus VMI update. My company got Norton anti virus software installed on the system from the Norton anti virus software CD and it was not Norton system works, just the Norton anti virus software. After somedays, it...

    Nishant70 pointsBadges:
  • Network Connection Freezes

    For some reason, at random, among 20 PCs on my network, in the morning or during the day, the network connection stops responding for both intranet and internet communications. The only solution thus far is to remove the NIC from the Device Manager, reboot the PC, and let Windows XP Pro find the...

    DboiSOBE0 pointsBadges:
  • Allow regular user to unlock screensaver locked computer

    We have the problem that in a multiuser environment users either lock their computers, or have the screensaver automatically lock it, and leave the workstation. As a result, nobody else can use that computer. By default, only the current user or an adminstrator can unlock the computer. I would like...

    AdminGurl0 pointsBadges:
  • Procedures for a new area

    We are a company where we have experience on network remote administration and now we have open a new area, The area of security. Now I need to start to make new procedures like when a new customer come to us and ask if we can handle the security for his network. I need to know if some one can...

    Millan0 pointsBadges:
  • What do you foresee as your biggest security concerns in the upcoming year?

    As you begin planning for next year's department spending and resource allocation, what do you foresee as your biggest areas of security concern in the upcoming year? Do you think particular areas will require special attention or resources?

    JennyMack4,280 pointsBadges:
  • Information security questions

    Hi everyone, I am new to this field as a 2nd career, previously was in mfg. engineering for a lot of years. Need some help with the following questions for a class I am taking. Need to get feedback with professionals in the field to determine what issues they think are important for information...

    FrankAZ0 pointsBadges:
  • Data vs. perimeter vs. network security

    A short time ago, author Wes Noonan wrote some tips for SearchWindowsSecurity.com about deperimeterization. He explained how security is always pitted against business needs, and perimeters have become porous because businesses require traffic from SMTP, HTTP or VPNs to pass through the firewall....

    RobynLorusso230 pointsBadges:
  • ChoicePoint CISO says breach not an information security issue

    The CISO of ChoicePoint says the theft of private information on 145,000 from its databases isn't an information security issue because conmen used fraud, not hacking tools or techniques, to get the information. Anyone agree with that? Check it out:...

    Athletica0 pointsBadges:
  • Front-End Reporting Tools for Secure Web Service Application with MS-SQL server-2

    Hi... We are a Cdn Govt agency involved in Satellite Operations with a commercial partner based across the country. We will need to build/buy a small secure web service application for reporting purposes that will require minimal IT expertise to build or maintain, and will deliver maximum...

    Mmosystem0 pointsBadges:
  • Block IE or Internet access with group policy

    Is there any way to block Internet access with group policy? I am setting permissions for some of the machines locally to only allow certain users access to the IE executable, but that is a pain in the butt. I have: Win2k3 single domain with 2 DC's approx 50 XP Pro workstations. I'm guessing this...

    TheVyrys0 pointsBadges:
  • Developing an antivirus (efficient):for Windows:Using VC++

    I am working on a Project for making an antivirus.I have 2 other project parteners. But we don't have an guidance on how to develop the antivirus.Plz give me any relevent Information on this subject.(like components of AV,Algorithms(efficient),methods,general detection & removal of virus).(Also...

    4238830 pointsBadges:
  • Developing an antivirus (efficient):for Windows:Using VC++-2

    I am working on a Project for making an antivirus.I have 2 other project parteners. But we don't have an guidance on how to develop the antivirus.Plz give me any relevent Information on this subject.(like components of AV,Algorithms(efficient),methods,general dection & removal of virus).(Also...

    4238830 pointsBadges:
  • Active Dir. Web Based Password Reset Tool?

    We run a native 2003 Active Directory. We have many remote users who have an AD account (without an Exchange account). Quite often we get emailed from users who are requesting password resets, or account unlocks (since we have a 5-try account lockout policy in effect on the domain). Obviously,...

    GregNottage0 pointsBadges:
  • Information Security Awareness

    We are in the early stages of creating an Information Security program for our new company.  I would like to email monthly security tips, tidbits, etc  for Security Awareness to all employees.  Have you seen anything "catchy", grab your attention type email subject lines and/or icons, so we can...

    Toyz5 pointsBadges:
  • Application Access Control Management

    Is there an enterprise wide software management program that can manage access to our web-based applications, vendor specific programs located thru out the entire company, and our MS applications, including MS Outlook? In other words, we would like to control all of the various software programs...

    NBf9910 pointsBadges:
  • How Many Information Security Policies Do I Need?

    I need some advice from other security experts. I was recently hired to work for a small company where our data and infrastructure is at a managed hosting facility. The hosting service has a SAS 70 that is regularly audited.  My company in the past relied – almost solely – on the managed...

    Vper10 pointsBadges:
  • ID Theft and National Security

    If it turns out, as I believe, that enemies of the United States are behind a lot of the major ID thefts in the US, that would mean that a lot of money is going to our enemies. Can we therefore surmise that those who mishandle our identity information, by means of their poor stewardship of our...

    InfoSafety75 pointsBadges:
  • Open IT Forum: What security-related lessons have you learned?

    What is the hardest or most costly (whether it be time, money or pride) lesson you or your company has learned regarding security? We want to hear your security-related stories, concerns and blunders in the discussion area. The most entertaining or insightful stories have 200 knowledge points...

    MelanieYarbrough6,345 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

Thanks! We'll email you when relevant content is added and updated.

Following