• What is this code? I am trying to TRUST a forwarded email!

    I was sent an email from an associate and I am looking at the source code is this a unicode? PGh0bWw+DQo8aGVhZD4NCjxtZXRhIGh0dHAtZXF1aXY9IkNvbnRlbnQtVHlwZSIgY29udGVudD0i dGV4dC9odG1sOyBjaGFyc2V0PXV0Zi04Ij4NCjxzdHlsZSB0eXBlPSJ0ZXh0L2NzcyIgc3R5bGU9...

    Solarsavant5 pointsBadges:
  • How has Biometrics improved the security of a computer system

    Would anyone tell me how biometrics have improved the security of a computer system? Thanks!

    Katso79ron5 pointsBadges:
  • Mail Tracking in Exchange 2003

    I am the administrator of Exchnage 2003. How can i read all user's incomming and outcomming mail fromthe server????

    Hukam5 pointsBadges:
  • How do I encrypt an email?

    I want to send an e-mail and I want it encrypted so it can't be sent to others.

    Secure4me10 pointsBadges:
  • How to do a global change of names in a security dir!

    A staff member was given the job of creating a new security dir and moving the data from the old to the new. what he did was to delete the user and they should not log in, create a new login for them we are using Microsoft 2003 server, under XP pro. Anyone know how to globally move user data from...

    Yahoopap10 pointsBadges:
  • How to confine the login screen of the users to see only the domain login options

    I am a network administrator. I have windows 2003 server sp2 standard edition, all clients are XP sp2. My questions: any GPO /server solution to prevent all users to login to their local administrator? ( I would like to confine the login screen of the users to see only the domain login options )

    Sshh235 pointsBadges:
  • Is this network certification path good for an aspiring ethical hacker?

    Hi there! :D I am a student that's currently getting a degree that focuses on networking and ethical hacking. I am working to earn a few certifications while holding a part time job for experience. From beginner to expert, I am aiming to achieve the following certifications (in order): CompTIA...

    NetworkingATE1,545 pointsBadges:
  • Free IT Book: Next-Generation Data Center Architectures from Cisco

    This week's free IT book is your complete guide to planning, configuring, managing and troubleshooting NX-OS in enterprise environments: NX-OS and Cisco Nexus Switching. For your copy of this great resource for Next-Generation Data Center Architectures, simply answer one of five questions below and...

    MelanieYarbrough6,345 pointsBadges:
  • How to be a professional hacker

    Can you tell me how to become a professional hacker? Are there any global certifications for it?

    NetworkingATE1,545 pointsBadges:
  • Error Message: Program trying to send an email on your behalf

    I am using MYOB to email payslips and get the message "a program is trying to send an email message..." how do i set outlook to do this automatically so i dont have to hit 'allow' for each email- IS THERE A WAY FOR OUTLOOK TO RECOGNISE MYOB AS A TRUSTED PROGRAM TO SEND EMAILS?

    SuttonRoad5 pointsBadges:
  • Error message ‘Program is trying to send an email on your behalf’

    I am using MYOB to email payslips and get the message "a program is trying to send an email message..." how do i set outlook to do this automatically so i dont have to hit 'allow' for each email

    Natmaher5 pointsBadges:
  • Configuration Management tool

    Is anyone aware of a configuration management tool that allows tracking and management of all resources (hardware, software, people, budget and schedules etc) associated with an application? Ideally this would cover both open systems (Linux, MS etc) and Mainframe ZoS. For example, a new project may...

    PeteW100 pointsBadges:
  • How to enable administrator account in Windows XP

    How do I enable an administrator account in Windows XP?

    Suryamishra765 pointsBadges:
  • Best method for locking down a workstation for guest use

    What is the best method for locking down a workstation for guest use? I have been looking at Steady State from Microsoft. Is this easy to setup? Will it prevent the system from being damaged from viruses or spy-ware? Is there a better option?

    ITKE351,290 pointsBadges:
  • Cisco PIX firewall 6 error messages

    I am using PIX version 6.0 and get the following error messages %PIX-1-103001: (Primary) No response from other firewall and %PIX-1-104002: (Primary) Switching to STNDBY

    JimmyIT1,725 pointsBadges:
  • domain configuration

    Recently I have joined in a company as a system administrator. Now I have to configure a Domain where the users will not get any permission to change their desktop settings and also will not be allowed to add/remove any program. How do I implement this through Group Policy? Give me the detailed...

    Kolkata25 pointsBadges:
  • What is the best security framework?

    I am currently a student at UAT and we were directed to this forum with the instructions to post a question about Security Frameworks, so the best question I can have is, What Security Frameworks have any of you personally worked with and which do you feel is better?

    ChadDiehl5 pointsBadges:
  • Should I use a website for downloading music?

    Hi, I was looking for a website to download music for my device. I found many, but most of them were asking for payment for music. I found a website which said that it's the first music search engine and they let you to search and download any kind's of songs for free. My questions are: Is it...

    Sximul20 pointsBadges:
  • My smartphone might be corrupted

    Have found out of state locations in different areas of phones files. What is ERI File ID? My phone says this file is unavailable. Google gives different IP address than what's shown on my phone. Tasks won't shut down and unusual processes continue when tasks are killed. Gmail won't download files....

    rethom5 pointsBadges:
  • How to open encrypted file

    I have formatted one PC, after re-installing all software system won't allow to open all excel,word files showing "file access denied...encrypted file or read only", though I logged through administrator with all rights. All files was encrypted by earlier user and created certificate, before...

    Pva15 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following