• Is Outlook 2007 IRM HIPAA compliant?

    Trying to figure out if by using Permissions in Outlook 2007 to encrypt and password protect information--it that considered HIPAA compliant?

    ITKE352,565 pointsBadges:
  • ISA and Torrent

    How we can block peer to peer (torrent) on server side in Window Server. If some body knows, please let me know. Thanks!

    Amin4rmOvexTechnology250 pointsBadges:
  • Is it safe to close ports?

    After port scanning is done, is it safe to close the ports which were listening, or are there better ways to ensure prevention from attacks? Is it possible to implement any such way through a java program?

    curiousStudent15 pointsBadges:
  • User profile cannot be loaded on my PC

    How to solve to my PC question. My user profile cannot be loaded. What should I do?

    Ariful1115 pointsBadges:
  • Adding a password to a SQL Server 2005 database

    We are moving our Microsoft Access database to SQL Server 2005, and the Access database has password protection. How can you add a password to a database in SQL Server 2005?

    SQL Server Ask the Experts2,585 pointsBadges:
  • BitLocker and Business versions of Windows

    BitLocker drive encryption is intriguing and important, but it's available only in Vista and Win 7 Ultimate and Corporate editions. Since these are the most expensive versions of the OS, most smaller companies use the Business version of Windows--what are some encryption options for them? As a...

    SearchMidmarketSecurityATE150 pointsBadges:
  • AES encyption: More secure than SHA1?

    I know this is more of a curiosity but I wanted to get some expert opinions on this. I recently heard someone recommend stepping up from md5ing (not to SHA1) but to AES encrypting the password, which would use itself as the key. Does anyone have any recommendations on if that would be more or less...

    ITKE352,565 pointsBadges:
  • What is SHA-1 and MD-5 encryption?

    What is SHA-1 and MD-5 encryption?

    Jbt5 pointsBadges:
  • What is the best free Syslog tool?

    What is the best free syslog tool? We used to use kiwi but it is no longer free. We need to simply monitor a syslog, write it to disk and resolve IPs in it to host names.

    Troubleshooter24755 pointsBadges:
  • COMMUNITY ANNOUNCEMENT: Tell us your Data Center Tales and you could win a Nintendo Wii

    Tell us your Data Center Tales and you could win a Nintendo Wii We want to hear your stories or see pictures of your craziest data centers. Your contest submissions will be published on the Tales from the Data Center blog for all to read. This two-month long contest (Oct-Nov) is your chance to win...

    ITKE352,565 pointsBadges:
  • Cisco 1548U: A managable switch?

    I have a aCsico 1548U. Unfortunately for a project that I am working on right now we need a manageable switch, and there is a huge lack of funds. Is it possible to make the 1548U into a manageable switch so that I can achieve my goal?

    Jhazard11240 pointsBadges:
  • Blocking a torrent web site

    How we can block a torrent web site by using ISA or any other Method in Window Server 2003?

    Amin4rmOvexTechnology250 pointsBadges:
  • Blocking the sites on client’s system in the network

    I'm working on 2003 server and having 40 client systems in the network. I want to block all the sites on all client system except Google. What permissions will I give and what is the procedure to do this? Please tell me the solution on how to do this.

    32345 pointsBadges:
  • AS/400 ODBC

    Hi Our company uses AS/400 for our financial processing application. The users access the AS/400 through an emulator. They also access the application database through ODBC. They extract the data to excel sheets to create certain reports for their own purpose. Recently, one the data base files in...

    Pgsdeb20 pointsBadges:
  • Changing port number for server

    How can I change the default port no.=80 from server?

    Mia5 pointsBadges:
  • How do I set up the Cisco ASA 5505?

    I have a static IP address for the Modem and I believe that I set up the outside VLAN2 correctly with another IP address that I have for the ASA. The IP address that I have setup is 192.168.10.1/0 for the pc, and I have set this up as static also. So my question is what is the default gateway for...

    Levelheaded53685 pointsBadges:
  • What are the requirements to start using Symantec Ghost

    My company is about to start using Symantec Ghost to image several computers (hundreds). What are the requirements for the Server? What other softrware is needed?

    Tiffany4655 pointsBadges:
  • Is the use of public clouds a good strategy for our company?

    Given that the company currently: Has no hardware or software infrastructure Intends to use cloud based SaaS for its major business applications Use MS Office Professional and a few other misc software tools as its only PC/Notebook installed software. Would you concure that maximizing the use of...

    IMFSystems5 pointsBadges:
  • Leading cloud companies true levels of security

    After being burned by JustCloud.com and their horrible ways of conducting business, I am curious to know if there is some report, or database, or comprehensive review of the true levels of security that the main players in the cloud industry provide, how it is they achieve such levels of security,...

    AndyRGP5 pointsBadges:
  • Alternative to using LSA?

    Hi All, I am integrating AD authentication into a software module that I have built but I am having problems. The software runs on an embedded image of Windows, which doesn't support LSA (Local Security Authority). Is there an alternative subsystem to using LSA? I have been reading up on other...

    SamCK25 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following