• Windows Server 2008 group policy for trusted sites

    We have Windows 2008 Server and all workstation have IE7. We want to set upTrusted Sites in IE7 via group policy for all workstations. How do i enable this option on windows server 2008 and the workstations. 

    ITKE54,900 pointsBadges:
  • Login Issue

    I have a notebook with a wired and wireless Internet port. The notebooks worked when hooked into the network through the hard wire, and could log onto the notebook. When the notebook was taken off site, the user could not log onto the notebook.   The administrator log on wouldn't work either. Any...

    Tomtek207115 pointsBadges:
  • How vulnerable is sensitive information on mobile devices?

    I'm quoted in today's Wall Street Journal in a special section on mobile security (page A20) and thought this subject would make for a good topic of discussion on ITKE. We hear story after story, breach after breach, and study after study related to sensitive information on mobile devices being...

    Kevin Beaver14,980 pointsBadges:
  • Tricky EIGRP routing quesiton

    Hello Sudhanshu, I have a bit of a tricky question that I've been wondering about. I'm going to be setting up over a dozen new ASA5510s in front of preexisting 2821 routers. I currently have EIGRP running in GRE tunnels between the sites. I have heard that the ASAs do not support GRE tunnels...yet...

    Richardvoyageur40 pointsBadges:
  • The IT Blog Top 10: Oct. 1, 2009

    10. Choosing a block size when creating VMFS datastores Eric Siebert provides a guide detailing how to choose a block size for VMFS datastores. 9. Using VRDP to view VirtualBox virtual machines remotely Rick Vanover walks through Sun’s xVM VirtualBox’s ability to tap into VRDP remote viewing....

    Michael Morisy7,943 pointsBadges:
  • Do you know of any cases when malware will detect a virtualized OS and exploit this fact?

    Do you know of any cases when malware will detect a virtualized OS and exploit this fact?

    ITKE54,900 pointsBadges:
  • Detection of visits to banned or improper sites?

    Hello Guys, I have enabled an option in a antivirus client to capture the web reputation logs. This give the information about which sites a user is visiting. The question is - Will this work if the user is outside the official network ? Will the antivirus client still have the log if the user uses...

    Rahul Shrivastava330 pointsBadges:
  • Windows server

    How to properly moniter windows servers.

    McAfee5 pointsBadges:
  • Cisco vs Watchguard, Netscreen foritnet

    in my mind, Watchguard, Netscreen and foritnet are same.(very little difference) but compare with Cisco PIX or ASA, what is it advantage?  

    Oasistech10 pointsBadges:
  • PCI 6.6 requirment

    which solution can fill the PCI 6.6 requirment?

    Shuli5 pointsBadges:
  • Information Security Career

    Hello , I've spent 13 months working on SonicWALL UTM devices , with a good foundation in Networking essentials , TCP/IP & Security concepts. Wanted inputs on what skill(s)/Certification(s) i've to work on to land a Security Admin position. -Thanks in advance

    Ace1355 pointsBadges:
  • USB + JAVA

    hello... i need to block a particular usb port where any flash drive is inserted and prompts for a password... developing everything is handy but i could not find a way to block the usb drive.?

    Javakks5 pointsBadges:
  • Career as pen-tester

    Hi i m wraith touch i m working working as a Security and Network Engg in an MNC. I have worked on cisco firewall, juniper firewall etc. Now i want to change my career to a [strong]Pen tester. [/strong]But i m confused as how to start and what will be the right way to achieve my goal.   regards...

    Touch65 pointsBadges:
  • Windows vista 32 bit business edition gives Error 800 when connecting via VPN

    Hello all, I was able to connect fine via vpn using standard Windows PPTP. After installing Symantec endpoint I ran into all kinds of dropped connection issues etc and ended up removing Symantec altogether. I can no longer get by the "connecting to <ip>" stage of the vpn connect process. I...

    Hypnotize15 pointsBadges:
  • sql .net 2005 deployment

    I am trying to connect my desktop application to sql server on a lan  but the clients are being recognised as guest how do i enable ny appplication to run on the lan. I am using windows authentication.  

    Semauel8515 pointsBadges:
  • AS/400 user password complexity

    How can I force system users to keep their password with special character, I have been assigned this to do, is it possible in AS/400?

    Vinay40055 pointsBadges:
  • What are the steps to identify missing security pacthes in AIX V5.3

    Hi What are the steps to identify missing security pacthes in AIX and how to apply the gaps. Thanks in advance !! Dharma    

    Dharmagrao100 pointsBadges:
  • How much should IT disclose post-intrusion?

    As SearchSecurity's recent podcast noted, Apache's recent security disclosure was unusual in how thorough it was. Just curious: What's your company's intrusion or malware disclosure policy, and are you happy with how it's implemented?

    Michael Morisy7,943 pointsBadges:
  • LINUX Key Audit checklists

    Is there any standard LINUX Audit checklist procedure for assessment?

    Dharmagrao100 pointsBadges:
  • Security advisories

    Does a security research firms track record of vulnerabilities and exploits published make you trust them more, or more likely to hire them?

    Michael Morisy7,943 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following