• Detection of visits to banned or improper sites?

    Hello Guys, I have enabled an option in a antivirus client to capture the web reputation logs. This give the information about which sites a user is visiting. The question is - Will this work if the user is outside the official network ? Will the antivirus client still have the log if the user uses...

    Rahul Shrivastava330 pointsBadges:
  • Windows server

    How to properly moniter windows servers.

    McAfee5 pointsBadges:
  • Cisco vs Watchguard, Netscreen foritnet

    in my mind, Watchguard, Netscreen and foritnet are same.(very little difference) but compare with Cisco PIX or ASA, what is it advantage?  

    Oasistech10 pointsBadges:
  • PCI 6.6 requirment

    which solution can fill the PCI 6.6 requirment?

    Shuli5 pointsBadges:
  • Information Security Career

    Hello , I've spent 13 months working on SonicWALL UTM devices , with a good foundation in Networking essentials , TCP/IP & Security concepts. Wanted inputs on what skill(s)/Certification(s) i've to work on to land a Security Admin position. -Thanks in advance

    Ace1355 pointsBadges:
  • Windows vista 32 bit business edition gives Error 800 when connecting via VPN

    Hello all, I was able to connect fine via vpn using standard Windows PPTP. After installing Symantec endpoint I ran into all kinds of dropped connection issues etc and ended up removing Symantec altogether. I can no longer get by the "connecting to <ip>" stage of the vpn connect process. I...

    Hypnotize15 pointsBadges:
  • sql .net 2005 deployment

    I am trying to connect my desktop application to sql server on a lan  but the clients are being recognised as guest how do i enable ny appplication to run on the lan. I am using windows authentication.  

    Semauel8515 pointsBadges:
  • AS/400 user password complexity

    How can I force system users to keep their password with special character, I have been assigned this to do, is it possible in AS/400?

    Vinay40055 pointsBadges:
  • What are the steps to identify missing security pacthes in AIX V5.3

    Hi What are the steps to identify missing security pacthes in AIX and how to apply the gaps. Thanks in advance !! Dharma    

    Dharmagrao100 pointsBadges:
  • How much should IT disclose post-intrusion?

    As SearchSecurity's recent podcast noted, Apache's recent security disclosure was unusual in how thorough it was. Just curious: What's your company's intrusion or malware disclosure policy, and are you happy with how it's implemented?

    Michael Morisy8,323 pointsBadges:
  • Client/Server types

    In reference to clients/server (domain environments) what are the two different types of groups and what are they used for?

    Lojack10 pointsBadges:
  • LINUX Key Audit checklists

    Is there any standard LINUX Audit checklist procedure for assessment?

    Dharmagrao100 pointsBadges:
  • Security advisories

    Does a security research firms track record of vulnerabilities and exploits published make you trust them more, or more likely to hire them?

    Michael Morisy8,323 pointsBadges:
  • What should I do about the Microsoft FTP IIS vulnerability?

    Microsoft announced its next patch Tuesday fix will cover five critical issues, but a fix for the FTP Service in Microsoft Internet Information Services 5.0 vulnerability. What are you doing, if anything, to protect your systems since malicious code is already circulating?

    Michael Morisy8,323 pointsBadges:
  • What do you foresee as your biggest security concerns in the upcoming year?

    As you begin planning for next year's department spending and resource allocation, what do you foresee as your biggest areas of security concern in the upcoming year? Do you think particular areas will require special attention or resources?

    JennyMack4,280 pointsBadges:
  • logging on as administrator on a user’s windows vista computer

    how can i login on a user computer(windows vista) on windows server 2003 network. probably the user put certain permissions,how can i change that

    Dawdaw210 pointsBadges:
  • Contest Update: Nominate a member and you could win 1 of 5 Amazon gift cards

    A quick and important update on our Panasonic flatscreen contest and the nominations process -- we will be giving away five (5) $20 Amazon.com gift cards at random to members who nominate someone in the community feedback form here. Thanks!

    ITKE346,080 pointsBadges:
  • VPN hacking

    I have setup VPN and have noticed, unknown address trying to established VPN with my internet PIX how can i block the user on my PIX515e?

    Apara10 pointsBadges:
  • e secure or security

    i did btech in ece  and did 2 month  training in embeded system and 6 month in java web applications and now working in the field of e security... suggest me what to do furthur either stay in same field and raise my experience and then do some certification in that field     or move for some...

    Esecure12315 pointsBadges:
  • Subnets for Exchange 2010 and Domain Controllers

    Is there security advantage of having domain controllers on different subnet from member servers hosting Exchange 2010 (MBX, CAS, HUB)? Or due to number of required ports to be open the firewall essentially becomes a "swiss cheese".

    Thomas199125 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following