• Company policies on protecting personal data

    I'd like to know what policies other companies have in place to protect personal data of employees, customers, etc.(data such as Social Security numbers, credit card numbers and the like) For example, is encryption required for transfer outside the company? How about inside the company? It is...

    Copleydt0 pointsBadges:
  • regarding vpn

    hi , i have to do project in vpn using l2tp.i have to test it between two linux machines. can anyone give me the steps to do that ? It will very useful for me if u give the websites regarding to that. thanks in advance. with regards, Nirmala.

    Nirmala20050 pointsBadges:
  • Seeking SAP SEM configuration help

    Recently, Manish, a SearchSAP.com user, sent in the following question on SAP SEM. <p> "Apart from standard SAP help, does anyone know of a SEM-BCS step-wise configuration guide? <p> Is there anything I can order online? I want to start on SEM-BCS as soon as possible." <p> Do you...

    laurenhoyt115 pointsBadges:
  • “Controled” proxy

    Hi, I need to control my user's access to different sites. for example user1 should be able to access www.yahoo.com on providing username/password, where user2 should be denied (or get password from Admin... :-) ), in otherwords the software can keep the profiles of different user to access my...

    Manije0 pointsBadges:
  • Need Help – Netscreen 25 with Fortigate 60.

    Hi All. Good Morning & Greetings of the season. I recently joined this company as a Network Security Specialist & the 1st task that i got assigned to myself was this. We have 3 locations - A (India) - Indian Operations B (California) - US Operations C (Datacenter) - Web & Media Servers My network...

    Nileshroy0 pointsBadges:
  • Windows logon by fingerprint

    I would like to tighten desktop security by replacing/renforcing the login passwords with fingerprints. The userID must be matched to the user's fingerprint for logon authentication. My USB fingerprint scanner already has software that enrolls, verifies and stores fingerprints in a database in the...

    0JeanLuc00 pointsBadges:
  • Password aging on Solaris

    We currently have 6 Sun servers of various models, all running Solaris 9. I've been tasked with implementing global password aging for all these hosts. I know that I can set global values for use when creating new users, by modifying /etc/default/passwd (although I would prefer to set it in days,...

    Sonotsky695 pointsBadges:
  • Denying Internet Access to User on Network

    I have a PC on our network that has more than one user. I know how to deny access to the PC itself, but I would like one user be able to access our network, but not the internet. The other user to access both. The server is running Win2003SBS, the PC is running WinXP. I am pretty sure this is...

    TeeJay0 pointsBadges:
  • user password auditing

    We have recently purchased LC5 to perform password audits to discover weak passwords. The documentation indicates to use PWDUMP3 to extract password hashes from the Active Directory. I have looked everywhere and cannot find a legitimate site to download this tool nor can I find documentation. Has...

    INSANEIT0 pointsBadges:
  • Windows 2000 / 2003 Server Log Management

    Hi All, I am an IT Security Administrator of my company. i need to audit more than 100 Windows servers for systems logs, event logs , anti virus server logs almost every month. I am looking out for automated tools that can help me make my work easier. A product with a good reporting tool will be...

    Tarang0 pointsBadges:
  • how can an application disable/enable a user account in active directory??

    How can a fingerprint reader be used to disable/enable a user account?? Could I use a VBscript to do this?

    0JeanLuc00 pointsBadges:
  • Prefferred Anti Virus Program?

    Hi All, Can i get any suggestions on what you consider being the BEST Anti virus software with not much hassles! The 2 i`m most interested in is Norton and Mcafee? Any 3rd party app will also be greatly appreciated! I had Norton 2005 Internet Security on my PC,1.7GHZ AMD,Win XP SP2, 384MG RAM and...

    Wazzup0 pointsBadges:
  • ECPI college…good or bad

    Good Evening: I've recently completed 8 years in the US Navy and I'm looking to complete my degree and I see a lot of talk about ECPI college. It's a technical college but it's a 2-year degree. I'm looking to get into computer network design and computer science and I'm wondering if ECPI or any...

    TripleHHH0 pointsBadges:
  • ECPI college…good or bad-2

    Good Evening: I've recently completed 8 years in the US Navy and I'm looking to complete my degree and I see a lot of talk about ECPI college. It's a technical college but it's a 2-year degree. I'm looking to get into computer network design, internet security and computer science and I'm wondering...

    TripleHHH0 pointsBadges:
  • Pix Firewall and Proxy Server

    I need to allow only one IP address (the one for proxy server) to browse through Pix firewall to Internet. What will be the commands in PIX firewall to block the traffic to Internet from all the network 10.2.1.x but only allow 10.2.1.10 (Proxy server). All other computers will use proxy server...

    EngineerIT0 pointsBadges:
  • Windows 2000 Server logs

    Hi All, Basically i want to monitor all the activities of my administrators. Is there any way I can find out all the activities on a Windows 2000 Server eg:- success / failure logs ,which users had logged on to a server , user creation time ,service stopped at what time, what scripts have been...

    Tarang0 pointsBadges:
  • Associating MS Certificates w/ handwritten signatures

    Does anyone know if it is possible to associate a Microsoft PKI/Certificate to a signature image (handwritting) so that a document/email can be signed (digitally) but will also have an image of the associated handwritten signature embedded within the document (and secured)? I know more advanced...

    Michael7110 pointsBadges:
  • Using client certificates with Cisco VPN 3xxx concentrator

    I am specifically looking for a way to match Windows loging credentials with a user certificate and then transparently submit to Active Directory for authentication. It seems that the Cisco VPN client first checks the validity of the certificate (without matching the Windows credentials) then...

    Stuberman0 pointsBadges:
  • IT Security

    Hi all, Thanks to all those who answered to my question"FTP sites" Can anyone of you let me know about the available products that we can use for our organisations IT security..Also let me know what products are available to find out vulnerabilities in a network. Appreciate your response. Thanks...

    Tarang0 pointsBadges:
  • Need guidiance from pros already into the game

    Hi, I am a United Stated Marine stationed overseas since 2003, majoring in Information technology with National University. I am still an idiot in the field and thats why i joined this group. To get a glance of what to ecpect in the future. I am asking for your help in guiding me through whatever...

    Foguno0 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following