Somebody was on my system and viewing pages they should not have been and now I have a virus. A window comes up that says Resident Shield Alert c:windowssystem32phc5j4j0ee5l.bmp,it also says threat name is “trojan horse Generic_c.0YJ. I’ve tried doing a system restore, but that didn’t work and beyond that I don’t know what to [...]
Answer Question | June 27, 2008 1:28 AM
Trojan horses, Viruses, XP error messages
I want to how to conduct a risk assessment to protect our pcs, networks
Answer Question | January 30, 2012 7:24 AM
Information security governance, malware, Risk analysis, Risk assessment, Security threats, Spyware, Viruses
I’m an auditor, and I like to know things like: are there local IDs on servers? Are those local IDs also in the administrator group? Not only that, I need to hand this script out to various admins, so I can’t specify one domain name in the script. So, first I need to get the [...]
Answer Question | June 27, 2008 12:36 AM
Scripting, Security, VBScript, Windows scripting
I wish to know that, whether deployment of a single UTM box will do a better job then combination of both firewall & web security software in place together?
Answer Question | June 25, 2008 4:19 PM
Firewalls, Unified Threat Management, UTM, Web security
Hi, I have a Cisco Pix which currently has an internal, dmz and outside interface. My outside is my default route, however I have now new separate connection (interface 4) that connects to the internet also that I would like to route some outside bound traffic through. As i understand it you can only NAT [...]
Answer Question | July 2, 2008 11:16 AM
Cisco, Cisco 2800, Cisco PIX, Firewalls, NAT, Network, PIX, Routers
hello sir i want to know how to block porn websites and messanger through isa-server 2004
Answer Question | June 25, 2008 9:50 AM
ISA Server, ISA Server 2004, ISA Server configuration
I am running windows 2003 server. My company is in the process of becoming PCI compliant, I am look to tighten up security as far as accessing programs internet and so on I was told the best place to start would be to creat a post logon script that is ran when all users login, [...]
Answer Question | June 25, 2008 8:00 PM
Login scripts, Logon, Scripting, Windows Server 2003
I have a Lotus Notes user who keeps receiving the error message: “You are not authorized to access that database.” when working with his local copy of his email file. To my knowledge, he is not using a different ID file. The first two times this happened, we deleted the local copy of his email [...]
Answer Question | June 25, 2008 6:55 PM
Access Rights, Lotus error messages, Lotus Notes 5.x, Lotus Notes Database, VPN
Hello, Please I need some help here. In one of the branches of where I work, they need to access a particular drive everyday, but it prompts for a password which we at the head office need to put in by ourselves because its an administrator password and cant be known by the others at [...]
Answer Question | June 24, 2008 1:42 PM
Batch files, Password management
What security measures are considered when designing a web-application (besides the SSL encryption)? And what technologies are used to protect the application from brute-force, phishing, and pharming attacks.”
Answer Question | June 25, 2008 7:30 AM
Risk management, Security protocols, Web security
h’i i’m using a workgroup pc which is running win xp pro sp3,and i want to configure it to reguest me on startup to press ctrl+Alt+del to continue,i would like to know how if it’s possible.
Answer Question | June 24, 2008 9:51 AM
Login scripts, Security, Windows XP
Hey guys, sorry to annoy just wondering how would I Lock a user out of a program E.g. Internet Expplorer but still having it connected to the network, btw this is on WinXP SP 2. I havve been looking around in the GPO and Local Users and Groups but with no luck.
Answer Question | June 23, 2008 8:23 AM
GPO, Group Policy, Internet, Internet Explorer, Security, User Permissions, Web browsers, Web security
I noticed when i create a new user in the server, and when i log on to the user’s account he has access to some network drives, how did this happen and where can i find these settings?
Answer Question | June 23, 2008 5:27 AM
Network drives, User account management, User Permissions
how to configue firewall rules & restricted employees on one subnet and block ports 80 and 443.
Answer Question | June 25, 2008 8:48 PM
Firewalls, Policy Management, Port blocking
How to restrict certain user access internet in windows 2003 server domain
Answer Question | December 19, 2008 7:44 PM
Internet access, User access, Windows Server 2003
We have a computer on our network. This computer can access all of our network resources, but other computers on the network can not access this computer. This is what I have done to test: -Used BartPE to verify that there is no hardware issue, works fine when running BartPE -Does NOT work in Safe [...]
Answer Question | June 20, 2008 1:44 PM
BartPE, ICS, Network access, Network connectivity, Windows firewall
When benchmarking a SAS70 audit to determine if the necessary controls were audited, what standards do you use as guidance to determine the controls to be tested and the control objectives? Does IT rely on internal audit for guidance or do you have your IT processes documented?
Answer Question | June 25, 2008 5:13 AM
Auditing, Compliance, Risk analysis, SAS 70
I have two questions. First, how do I install SQL Server Enterprise Edition on Windows XP? And second, how can I find the SQL password without using an application?
Answer Question | June 19, 2008 8:13 PM
Installation, Password, SQL Server Enterprise Edition, SQL Server installation, Windows XP
the company that hosts my website has subseven running on the site they do not believe me they want a tasklist or something showing an exe is running how can i get them this
Answer Question | June 19, 2008 3:35 AM
Nmap, Security scanner, Sub7, SubSeven
Is there a way to implement row level security in SQL Server 2000?
Answer Question | June 18, 2008 7:27 PM
Implementation, Security, SQL Server 2000, SQL Server security