• what is the best security website?

    i want to know where to go for security resources on the web

    Opheliamemphis25 pointsBadges:
  • Information security questions

    Hi everyone, I am new to this field as a 2nd career, previously was in mfg. engineering for a lot of years. Need some help with the following questions for a class I am taking. Need to get feedback with professionals in the field to determine what issues they think are important for information...

    FrankAZ0 pointsBadges:
  • How Do I Move From AS400 Security Level 30 To 40?

    I have reviewed system values for QAUDLVL and found the we have the appropriate values running. I have reviewed the journals that contain over 3 months of information and determined that we have no AF or J entries. Is this all I need to verify before I recommend that we move to level 40? I have...

    TitaniumFJ5 pointsBadges:
  • Can I push out Microsoft Security Essentials to an entire network?

    Can I push out Microsoft Security Essentials to an entire network? How can this be achieved easily and quickly?

    TeachMeIT975 pointsBadges:
  • Exporting Active Directory server security log

    How can I export the data from a Windows Active Directory server's security log to create a graph of who logged in and out at what times?

    TeachMeIT975 pointsBadges:
  • Configuration problem on 2950 port security sticky behavior

    Hi, I am trying to put port security on a port, I want it to shutdown if another computer gets plugged into that port. I followed the following steps: I set these options: switchport mode access switchport port-security switchport port-security maximum 1 switchport port-security violation shutdown...

    Patelmanojk50 pointsBadges:
  • Modify environment for port security

    Hi All, We have enabled port security in our environment using the below command switchport port-security mac-address sticky the above command reserves the mac address of the connected PC to that particular port and in order to remove this we have to give no  switchport port-security mac-address...

    Vptechie70 pointsBadges:
  • Is Forefront client security server compatible with Server 2008 R2?

    Is Forefront client security server compatible with Server 2008R2? This question is from the Microsoft Live Chat which took place on July 13th.

    ITKE342,620 pointsBadges:
  • Critical Error in Security Log

    All, I manage a Windows 2003 Small Business Server Network with 9 clients. The server provides all network services. We use Logon/logoff, shared storage, and print server functions. We do not use exchange except for the server reporting tool. We do use about 4 instances of SQL. All clients are...

    FlyNavy0 pointsBadges:
  • Free IT Book: CompTIA Security+ Certification Passport

    This week's free IT book is Mike Meyers' CompTIA Security+ Certification Passport: Revised for the new CompTIA Security+ exam (SY0-301). The new edition provides a condensed and concise review of CompTIA’s well-established security credential. For a chance to win this quick review, cram-style...

    MelanieYarbrough6,345 pointsBadges:
  • Bypassing Cisco Iron Port

    How do I bypass Cisco iron port web filtering using proxy setting and port numbers?

    Mubs110 pointsBadges:
  • Road to become a Security Auditor?

    Hi, I am really confused about way to follow to become a Security Auditor... and the opportunities it has in future.. esp. in India? Currently I am working as a Security Consultant but dealing only with Security Related products including Firewalls, NMS, IPS etc and not Standards like BS7799,...

    Ind5 pointsBadges:
  • Exporting Windows server 2003 SAM database for external security audit

    We need to export the windows server 2003 SAM database to a standalone server for an external security audit. Where do I find this file or how can I export the data needed?

    NewnanIT1,110 pointsBadges:
  • Security/ Audit Check list for DB2

    Hi, I'm in the process of hardening the DB2 in Linux and I'm looking for a checklist to help me make sure I don't miss anypoint. Since I'm not an expert on DB2 I would like to have a starting point. I'm looking to make sure I don't leave open doors and also I want ot make sure I don't get an Audit...

    Josec990 pointsBadges:
  • Application data security versus network security

    What are the pros and cons of application data security versus network security? Which do you recommend devoting more budget funds to?

    NewnanIT1,110 pointsBadges:
  • Free IT Book: The Accidental Administrator: Cisco ASA Security Appliance

    This week's free IT book comes with a bonus interview with the author, Don Crawley! Check out what he has to say about the book, the process, and the joys of being an IT-type personality. Then answer one of the questions below and post the link to your answer in the discussion section for your...

    MelanieYarbrough6,345 pointsBadges:
  • Checklists for Router, Firewall and Switch security

    I have recently been shifted to Information security audit department. I need some checklists to check the security compliance for Router, Switch, and Firewall. Please provide me some checklists to audit the same.

    ISMS130 pointsBadges:
  • Cannot Ping Public IP from ISA server 2006

    Dear I am unable to Ping the Public IP over the Internet, My, Client is Behind ISA, ISA disallow to PING the Public IP on internet I want to enable but cannot done in ISA server 2006 E.E. I already add the ICMP and PING protocol in my Array

    Quakerquakest110 pointsBadges:
  • Are password-protected Zip files really safe?

    I have some worry about password-protected Zip files. From what I understand, even though a Zip file is password protected, you can still access it to look at the files on it and their types. This being the case, how secure is such a file, really? It's not a stretch to think that someone could...

    ITKE342,620 pointsBadges:
  • Are BYOD programs a security risk?

    According to a recent study by Ovum, 80% of corporate BYOD programs are 'inadequately managed by IT departments.' As more companies allow their staff to use their own computing devices to do work, they're struggling to address the programs that enable corporate control and guidance. How is your...

    Michael Tidmarsh28,760 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following