• Secure Wiki on SuSE Linux

    i am trying to make a wiki for my organization and am not sure where to start. What are some good packages to make your own wiki? On another note, i want to secure my wiki to where you have to authenticate yourself before you get onto the wiki. The information is sensitive and i only want certain...

    Subhendu Sen29,780 pointsBadges:
  • How to test if my Intrusion Prevention system is working?

    I have Symantec Endpoint Protection ver 11 installed, with ips and ids. How could I know if it is working or not? I tried to run a couple of tools, gfi languard ver 9.5 evalution version, zenmap, but they did not prodice any entries in IPS logs.. Any help is appreciated...

    Vnner5 pointsBadges:
  • Active Directory password policy

    We have just changed our password policy. We want to audit which passwords are in violation of the new policies before it is time to have them change them again. Can we force passwords in violation to request a change of password?

    Troubleshooter24755 pointsBadges:
  • Your turn to speak: Is a new Obama mandate putting IT security at risk?

    Yesterday, we told you about a mandate currently being drafted that plans to extend mandatory wiretapping to the Internet. We've received a good amount of feedback from members, including Gordon, who thinks the law would be "overkill...It will open up a can of worms to all the hackers and black...

    MelanieYarbrough6,345 pointsBadges:
  • ECC 5.0 sapgui login password policy

    we found one user who set 7 chars long password one month ago and was not prompted for password change at first logon today after we changed in rz10 login/min_password_lng = 8

    123simi5 pointsBadges:
  • Viewing specific security policies that apply to active directory 2003 user?

    How can I show the security policies that are being applied to a specific Active Directory user or computer? Can I compare them to other users?

    NewnanIT1,110 pointsBadges:
  • Exporting Active Directory user info to CSV

    Can we export all of our AD data to a CSV file for backup purposes? Can we export the passwords as well? Will they  be encrypted? Where can we find the encryption key so we can make heads or tales of them.

    Karl Gechlik9,860 pointsBadges:
  • How can I secure a Windows XP workstation that is open to port 80 and hosting a website using IIS

    How can I secure a Windows XP workstation that is open to port 80 and hosting a website using IIS? The box is on the DMZ of our firewall for the time being. We will probably move it inside the firewall and open port 80 to it shortly.

    Karl Gechlik9,860 pointsBadges:
  • Making Joomla public. Concerns and options.

    We have an internal Joomla website. We want to make it public to the Internet. What security precautions need to be taken? What do we need to make it public? We are running this on IIS off of a Win 2003 Server.

    Karl Gechlik9,860 pointsBadges:
  • Is there an AS400 command to extract user profile information for production environment only?

    I need a user profile list for as400 user in the production environment. THe DSPUSRPRF provided me all users for all environments (production, test, training). How can I only get users in the production environment?

    Mbalg5 pointsBadges:
  • Antivirus questions for Windows network

    Is antivirus on the windows 2003 server and not on the desktops of Non-connected devices? They can not get to the Internet. The user saves all files to the server. Is it ok to only have antivirus on the server?

    Karl Gechlik9,860 pointsBadges:
  • Access is denied to Remote Agent (veritas backup verion 10.00)

    I got a job fail report, it says "[tt class="ERROR">Access is denied to Remote Agent. Check the login account for the specified device[/tt][tt class="ERROR">"[/tt]   it was working fine the other day, i check everything, i make sure the logon account for the veritas have admin rights and i have...

    Calvin05 pointsBadges:
  • Production SQL Database has been restored with Old database backup

    Dear Expert, I need your Advice, today in morning i run Symantec backup restore on SQL 2008 server where i overwrite the production Database with Old backup. Is there any way i can retreive the old Database until yesterday. i dnt have any backup of New database which i accidentally overwritten.  ...

    Aleem60015 pointsBadges:
  • password

    I can't remember my admin password on an old workstation, is there any backdoor I can use to obtain the password or change it? Can I install another harddrive with an operating system on it and go into the old boot drive and find the password somehow?

    Thebigt15515 pointsBadges:
  • Block FTP access of all kinds using a Sonicwall Firewall

    How can we block FTP access to and from our network using a Sonicwall Pro 200 device? We want to block ftp, tftp and sftp. How can we do this?

    Karl Gechlik9,860 pointsBadges:
  • Uplinking one 4000m Hp Procurve to another

    What is the proper way to connect two HP 4000M pro curve switches together? Is there a specific uplink port? Can we connect the switch to the other using two ports for redundancy? (We tried this and it takes the network down!)

    Karl Gechlik9,860 pointsBadges:
  • How to configure two default gateways to be 2 ISP (PIX 525)

    I have a network as follows: PIX Firewall 525 uses three network interface Ethernet1, Ethernet2, Ethernet3. E1 (10.0.0.1, Inside) connected to LAN E2 (117.16.126.35, Outside) connected to the modem (117.16.126.33) ISP1 (This address by the ISP level) E3 (192.168.1.2, Outside2) connected to the...

    Arowana200015 pointsBadges:
  • Open IT Forum: Segregation of duties versus full access for sys admins?

    We had a question in the forums recently that brought up an interesting dilemma: In sensitive roles such as systems administrators, do you believe in granting full access or employing a segregation of duties to minimize risk? We'd love to hear how your company deals with these executive decisions...

    MelanieYarbrough6,345 pointsBadges:
  • Open IT Forum: Security concerns of forwarding work emails and other corporate personalizations.

    A recent question from the community regarding forwarding work emails to a third party account such as Gmail spurred a reaction of general distaste. What are your thoughts on the IT risks posed by melding the personal with professional, whether it be through social networking sites, smart phones,...

    MelanieYarbrough6,345 pointsBadges:
  • Protecting a file folder from everyone except two users

    Is there a way to protect a file folder on a Windows server 2003 from everyone including domain administrators? I want this confidential file to only be accessible to the President and I. How can I do this?

    Troubleshooter24755 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following