• How to allow outside access to internal pc securely

    Hi all, I need to allow an outside service engineer connect to a machine tool (PC attached) to run diagnostics on my network. What's the best way to allow him temperorily access to this internal pc? This will probably only happen a few times a month, so access doesn't have to be enabled...

    Pandub130 pointsBadges:
  • Unable to send mails in Lotus Notes webmail

    please let me knew which ports should be opened in checkpoint firewall to communicate with lotus note web mail.

    Edwinbelle5 pointsBadges:
  • how can I remove Anti spoofing feature in the check point

    I need to remove the anti spoofing feature from my checkpoint /....what to do for it

    Ritesh2r5 pointsBadges:
  • What is a good firewall appliance for 200 users?

    Looking for a good firewall appliance for around 200 users at my company.

    JimmyIT1,725 pointsBadges:
  • Do I have to use proxy with PIX firewall?

    i have pix 515E firewall and cyber roam device which is using as a proxy.do i have to use proxy with pix firewall

    Intrnetworking30 pointsBadges:
  • Problem removing anti-spoofing on R60

    Hi There I've removed the anti-spoofing on one of the interfaces to a firewall, but when I go to install the policy I get the error message below:   The Topology information must be configured for object *****, interface eth-s*p*c*, in order to use the Anti-Spoofing feature. Can anyone assitt?...

    Manliz2000275 pointsBadges:
  • Five t-shirts to give away: Upload those profile pictures!

    I've been noticing a dropoff in profile pictures lately -- here's a reminder on how to upload yours if you haven't already. If you're participating in the community, we want to know who you are! I'll be mailing out five t-shirts to the first five people (with eligible mailing addresses) to upload...

    JennyMack4,280 pointsBadges:
  • What type of swtich should I use?

    Hi Folks, I am not a Networking expert and I have been assigned to setup a system at work for other purposes which will require networking components. I have a 3 Hosts and each host will be connected to 7 target clients. These clients will always be changing hence I can't use their MAC addresses....

    NTnewbie40 pointsBadges:
  • Log onto to Windows w/o username or password

    My husband found a computer in the trash after a store closed. He brought it home I connected it and of course it requires a user name and pw. Obviously it works, but how do I clear that window so that I can work on the computer? Does any one know?

    G10197730 pointsBadges:
  • AS400 intreface with other platforms

    Can anybody tell me how to interface As/400 with other platforms say windows or linux for example

    Cute98862892710 pointsBadges:
  • Is it possible to reorganize a very big transaction in one night?

    I want to reorganize a very big transaction file in day end process and it cannot finish within 1 night. The problem is RGZPFM command lock that file ,so the day after , user cannot use that file because it is locked. Do you have any ideas to help me?

    Cookiekitty110 pointsBadges:
  • Blocking certain fields from being downloaded using Client Access

    Hi, By using WRKQRY, we can select the files and create output files. My problem is how do I block certain users from downloading certain sensitive fields like Price in the output file. Thanks..

    N4t45h40 pointsBadges:
  • Running a job in SQL 2005 by calling a batch file from a As400 CL program

    Hi, I already asked this question before but did not get any reply. Anybody please help.. I am calling a job on AS400 which uses RUNRMTCMD to execute a batch file on sqlserver 2005 server. This batch file uses sqlcmd command to run a job on sqlserver. When I execute this batch file manually from...

    Gullu15 pointsBadges:
  • V5.2 SAVSECDTA Problem

    I am trying to run savsecdta from V5.2 box so I can move the user profiles and authorities to a new iSeries. I have done this a thousand times and never had a probelm, but this time after the command is issued it runs for hours and hours and never finishes. Cum level is 3252520. Any ideas?

    Helpdesktf0 pointsBadges:
  • Array Corruption

    I have written an RPGLE pgm in which I took an array with a size of 400 (20 fields with a length of 20) and did a MOVEA to put it inside a character field of 400. I then passed this field to another program and I did a MOVEA to populate the array in the 2nd program. When I call the 2nd program...

    GHENDER190 pointsBadges:
  • HOW DO YOU ELIMINATE MULTIPLE ID’S PER USER, BY IMPLEMENTING SINGLE USER ID?

    I am the Security Admin for my company ane we run SRM 4.0 (SRM Server 500;EBP5.0). Due to the nature of our Organizational Structure, founded on several Purchasing Organizations and Purcahsing Groups, we have situations where our IOC (international Oil company) users, package and submit contracts...

    sapsecurity2885 pointsBadges:
  • mail send problem exchnage 2003

    Hi. I have confingured exchange server 2003. I'm sending and receiving mails. I have spam program GFI mail essential. and ISASERVER 2006 enterprise edition.But i have this problem: Ican send mail every domain expect one domain. i'll call this domain test.com. I colled this mail administrator he...

    Eliyevelxan1,235 pointsBadges:
  • Audit Journal entry type ‘AD’ for stream files (*STMF)

    Hi, When I analyse the audit journal for the journal entry type `AD?, I can see the following entries. My question is that in this type of entries I can not see object level details, (Object is *N). Is there any other method to see the object level details or any other related journal entries in...

    Gaminiwe0 pointsBadges:
  • Email and Web Security Merger

    Is your organization merging, or planning to merge, your email security and Web security gateway capabilities? Why does it make sense to do so, but more importantly, what are some of the gotchas you weren't expecting?

    SearchMidmarketSecurityATE150 pointsBadges:
  • What factors should go into a “social media” cost analysis?

    As Sister CISA CISSP pointed out, a lot of factors aren't included when companies embark on social media adventures, and it's usually IT that has to raise considerations. What would you suggest be included as companies draw out a "social media" total cost analysis?

    ITKE350,945 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following