• Combining Networks with Same IP Scheme, VLAN,

    Hi, We are combining an couple offices next week & i need some advice. The networks already have VLANs set up. we have a Cisco 3550 Layer 3 switch set up to route traffic. The servers are on this site also. The network IP's are 10.1.1.x, 10.1.4.x & 10.1.5.x. Servers reside on all of those networks....

    Ramii5 pointsBadges:
  • When working with shared permissions which permissions set rules NTFS or Shared?

    When working with shared permissions which permissions set rules NTFS or Shared?

    Mwiggins775 pointsBadges:
  • Looking for Basel ii training…

    I would like to take the Basel ii Certification, but I feel that I am not ready, does anyone know a training course? Which will be not expensive, and good.  

    KebabIT130 pointsBadges:
  • Is it possible to take CISSP and Basel ii exams at the same time?

    I would like to pass Basel ii and CISSP examinations. I am looking for a CISSP training course, which will be short and productive, and approximately at the same time, I wold like to have Basel ii training. Can someone suggest a possible solution?

    KebabIT130 pointsBadges:
  • ASA vs. Firebox

    I have a 150 user network, one main office with majority of users and 5 other branch offices.  15 servers and I use a Firebox 1000 for a firewall, i am gold that I should use a Cisco ASA 5510 for my firewall and management.  Is this the best for the price?

    KAS095 pointsBadges:
  • Join our ITKnowledgeExchange.com LinkedIn group

    We have created an ITKnowledgeExchange.com LinkedIn Group If you are a member of LinkedIn come and join the group. You will be able to continue the discussion or post questions that we will post onto the site. Thanks Sean Community Manager

    ITKE346,360 pointsBadges:
  • Cross-site scripting attacks

    I'm looking for advice on cross-site scripting. What can these attacks do and what can I do to protect Web sites/applications against them? Are there any resources you recommend? Thanks

    Kit1230 pointsBadges:
  • Looking for application vulnerability scanner

    My group is considering implementing an application vulnerability scanner to look for security holes in our Web sites. Can you recommend some products? Thanks

    Coder6270 pointsBadges:
  • The IT Blog Top 10: Nov. 12, 2009

    10. How to use command line arguments in VBScript via the Wscript.Arguments Object Jerry Lees offers up an indispensible guide for VBScripters. 9. Standard Server 2003 Migration to SBS 2008 Part 3 Roger Crawford’s third part of his series on Server 2003 migrations. 8. Success of 64-bit Internet...

    Michael Morisy8,323 pointsBadges:
  • How to install a digital certificate

    Has anyone installed a digital certificate on an iSeries lately?  For example, a certificate from VeriSign or GoDaddy.  Can you give me any pointers? After the certificate is installed we need to export it to a Microsoft ISA server which will be the front door for users who need to use our AS/400...

    WoodEngineer6,680 pointsBadges:
  • Microsoft Vista file sharing slowness

    My client is experiencing slowness access excel files on a vista share drive, the OS on the other computers is vista also.  What would cause this problem?

    Reggies90 pointsBadges:
  • Cisco 1548U: A managable switch?

    I have a aCsico 1548U.  Unfortunately for a project that I am working on right now we need a managable switch, and there is a huge lack of funds.  Is it possible to make the 1548U into a managable switch so that I can achieve my goal?

    Jhazard11240 pointsBadges:
  • iSeries – Monitoring QSECOFR when it becomes disabled

    What AUTOMATIC process could I put in place if I want to be notified by the system, when QSECOFR becomes *DISABLED? I have QAUDJRN on, and if QSECOFR becomes disabled, an entry is added. I don't know of a way to automatically be notified if QSECOFR becomes disabled. We are in a 24/7/365 shop, so...

    Mutkey0 pointsBadges:
  • Any advice from your latest Disaster Recovery review?

    Just curious if you have any advice from your latest disaster recovery review on what elements deserve particular attention. Frank Lady offers disaster recovery advice on SearchDisasterRecovery, but I'm curious as to whether elements like Swine Flu are playing part in how you sketch out how to...

    Michael Morisy8,323 pointsBadges:
  • How to improve system speed ?

    In our organisation,we have a 120 clients pc (o.s-XP) & one Domain Server (N.O.S-Win 2003 Server) .In this environment most of the computers are so slow.means ,network folder,shared folder,exel files are not opened fast. The  most of computers are hanged in this condition. ,already we changed...

    Parashu10 pointsBadges:
  • Security Risks of emailing paychecks through Outlook

    My company has just notified us that they will begin emailing check copies to employees with direct deposit. The file will be an Adobe PDF with four digit password. What kind of security / identity theft risks will this create for me?

    Grgagrl15 pointsBadges:
  • Help analyzing a minidump file

    A user I support has been having an ongoing bsod problem. I've been analyzing his minidump files for awhile now, and to me, they look to always point to crypto.sys as the problem driver. Crypto.sys is a driver used by Netscreen Remote (VPN client). Apparently, upgrading to the latest version is...

    Lordhowe175 pointsBadges:
  • Coding to prevent table overflows withing programs

    In this new world of zero tollerance for abends and the goal of 100% production stability, I have been charged with determining the best method to prevent abends due to internal program table overflows.  Our environment has Cobol, Eztrieve and Assembler programs with internal tables.  We are...

    NanetteHaraden20 pointsBadges:
  • Windows Security – Audit Risk

    I am performing internal audit on windows security monitoring process.  The client performs periodic review of windows domain administrators to detect if there were any unauthorized access.  For one of the review, we found out the individual was reviewing her own activity. My first thought is...

    Toosunneo70 pointsBadges:
  • What is SHA-1 and MD-5 encryption?

    What is SHA-1 and MD-5 encryption?

    Jbt5 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following