• Block user on local network

    How i can block the user on local network to asses the workgroup

    Rizham4565 pointsBadges:
  • HIPAA protection

    What functionality is currently available in BW to provide HIPAA required protection of data?

    Bollast5 pointsBadges:
  • Security+ Preparation for Exam

    Hello All, I am currently reading the Sybex 4th Ed book in preparation to take the CompTIA Security+ exam. I was wondering what is the best additional things I can do to assist with this. I am where possible using my current position as a system admin to assist with gaining security experience and...

    A5hley35 pointsBadges:
  • Need to make a parameter required !

    I want to code a *cmd with four parameters. 1. I want all of them to be required ( i.e. pressing enter without typing anything should issue a error message "Parameter BLABLA required") 2. I want to check at a *cmd level , not at the *pgm level behind the command if the entered parameter contains a...

    Iordache65 pointsBadges:
  • MSDE for adminDB

    Ever since I installed Diskeeper Administrator 2009 on my PC (it runs XP Pro, svc pk 3), every time I print something, I get some "MSDE for AdminDB" pop-up that says "Setup has detected that your current SA password is set to blank. Please use sp_password to set a strong SA password and restart...

    John82175 pointsBadges:
  • New Contest: Win the Nexus One Google Phone with your Knowledge Points!

    You're asking and answering questions already, so why not put those Knowledge Points to good use? Win a Nexus One, Google's new cell phone! It's unlocked, so you can sign on with the (select) carrier of your choice contract-free! Read all the details, but the short and long of it is that over the...

    Michael Morisy8,323 pointsBadges:
  • Allow cisco asa static nat to microsoft hyper v

    We have a Cisco ASA 5510 as our firewall.  I setup a static nat entry one to one  mapping, set up the cisco access-list open rdp 3389.  I am natting a public ip address directly to our ms hyper v image internal private ip.  The hyper v image is on a external network.  The ext network is...

    Stevenb1270 pointsBadges:
  • McAfee Virus Scan in Lotus domino server

    Hi, what is the proper command in stopping the McAfee from running in lotus domino? Right now, we were having a hard time sending and receiving messages from other mail servers reason being, our McAfee is currently scanning and don't know the command to stop it. Please help. Thanks!

    jhamn750 pointsBadges:
  • How can I stop users searching network drives?

    We have a number of mapped network drives and one of them is l linux mapped drive. When users search they tend to search all drives. When the Linux drive is searched it slows the linux server down for all users. How can I prevent them from searching a drive letter? I found this but is only for...

    RickC495 pointsBadges:
  • What to do after CISA?

    [strong]I want to become an IT Auditor and want to come to a [em]management level[/em]? What course should I do afer finishing CISA that will help me grow financially, and will increase my salary?How can I come to a management level in a company/bank?Please help me find the right path. I want to...

    CISA5 pointsBadges:
  • Storing encrypted files on an SQL Server 2000

    We are doing our final year project as a secured electronic voting system. To finish this project, we are in need of storing our votes in an encrypted form to provide security and, to do so, we are using back-end as SQL Server 2000. Is this possible or must we change our back-end?

    SQL Server Ask the Experts2,585 pointsBadges:
  • Configure Outlook 2007 “send as attachmnet” signature

    We have clients using XP PRO PS3 with Outlook 2007 as part of Office 2007 as the mail client. We are not running Exchange all clients use SMTP settings. When the users choose "send as attachment" in Word or Excel, I understand it opens up a "stub" of Outlook even if Outlok is open. Is there a way...

    swinehart68031,050 pointsBadges:
  • Career in Ethical Hacking

    Sir/Mam, Is there any Career in Ethical Hacking. If so then please guide for me the same. I am in the Final year of Computer Engineering from Mumbai  University.

    Saj75 pointsBadges:
  • Unauthorized wireless networks in your environment

    Do you have an official policy on unauthorized wireless networks in your environment? How do you go about detecting and disabling unauthorized devices, and what are the consequences? How often do you encounter this problem in your business?

    ITKE341,990 pointsBadges:
  • Network inventory/audit

    Hi is the any application which can audit machines on the network.

    ninjas180 pointsBadges:
  • hi all

    last day i installed one new xp theam on my xp system. recently i noticed that "RUN" option deleted from my start menu. can anybody help me in this problem ? thanks in advance

    Squibc40 pointsBadges:
  • Can what I do on my PC be monitored via a cable tap?

    Can what I do on my PC be monitored via a direct manually split cable tap on my roof? I have Zonealarm running but it typically asks for GHP services to IP addresses I dont recognize and asks for server and trusted zone access status inexplicably and often

    Dannyg135 pointsBadges:
  • Authentication problem when using ISA2004 as proxy server

    One of our users is not able to surf over our ISA2004-Server which is configured as internal proxy-server. When the user starts the Internet-Explorer, he is prompted to enter username and password. Normally the username/password is automatically transfered to the isa-server. When the user enters...

    Schedlbauerm5 pointsBadges:
  • Reminder: Microsoft Live Cloud Chat Tomorrow 02/23, 11 am – 2 pm ET

    Tomorrow, 02/23, Microsoft Experts Jim Glynn and Brett Hill will be joining us live on IT Knowledge Exchange to discuss the benefits of the Cloud on Microsoft products like SharePoint and Exchange. Visit the live chat page now to post your questions in advance in the comments area, or sign up for...

    ITKE341,990 pointsBadges:
  • More than one AV software

    I have seen many postings on different sites that recommend using more than one anti-virus software package. Yet every time I contact a vendor with a problem, the first thing they want me to do is UNINSTALL (not disable) all other AV software. Is there a significant problem with having more than...

    Anchovy15 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following