• LDAP Referrals

    ldap newbie here, tia for assistance want to use one repository (like AD) for authentication yet reference another repository (Sun One) for authorization to applications <since AD doesn't support multiple groups/roles/schema changes well>. example So for application A, want to have the...

    Hexbin4ever5 pointsBadges:
  • Monitoring and management of real time RPO and RTO

    Does it is practically possible to monitor and manage real time RPO and RTO for Disaster recovery environment?

    Amravati20 pointsBadges:
  • Spam prevention

    These spams send email from user mail to him (spam himself) So the user receive message say Not I have kaspersky anti spam with last update and kasperky anti-viruses last update Delivery Failure Report was not delivered to: xxx@mydomainname.xx because: Host 127.0.0.1[127.0.0.1] said: 550 5.7.1...

    Mizomotaz40 pointsBadges:
  • How to secure a printer and spooled files

    We need to secure our payroll printer and it's spooled files. Right now anyone is able to view, print or delete reports on this prnter's outq. The payroll person & anyone with SECOFR authority should be the only users with access. How do I set up this type of security? Thank you.

    Patxlb15 pointsBadges:
  • How to restrict the user from browsing the Internet and downloading from Windows Server 2003

    Dear sir, i want to know ,How to restrict the user from browsing the internet sites and downloading from windowsserver 2003.In client system i am having winxp.plz give solution for this problem. With regards, f.charles.

    Abcd79365 pointsBadges:
  • how do I troubleshoot checkpoint VPN?

    how do I troubleshoot checkpoint VPN? let's assume the user has full internet access from home. Do I check for user SSL certificate that is still valid? What is next step after checking SSL certificate?

    Spock12035 pointsBadges:
  • User Security Question

    I have inherited a network which has several issue but I need to setup a user that only has rights to one shared drive but no all shared drives. How can I do this as his network icon shows all shared folders

    Comtel10 pointsBadges:
  • protect sybase DB on centos server

    I would like to know if there is an anitivirus prog that will scan automatically on sybase DB's. Our server allows staff to upload word doc's into the DB,,, with the increase of virus's occuring on out windows PC's,,, i would like to add protection to the doc's in the DB. Any ideas?

    Detox5 pointsBadges:
  • Tool for monitoring users downloading fom Internet

    I want to monitor my network users like, which user is downloading more from Inernet because I am facing my Airtel DSL Internet Bill problem. Please Kindly tell me soon......

    Vikrant305 pointsBadges:
  • Applying no IP route-cache on VLAN interfaces in a Layer 3 switch

    Is it necessary to apply no IP route cache on virtual local area networks (VLAN) interfaces in an L3 switch and why? What are the advantages or disadvantages?

    NetworkingATE1,545 pointsBadges:
  • Will a BSc in Information Security get me a network security job?

    I would like to get my BSc in Information Security Systems. In the near future I would like to get a networking security career. Do you think this is a good degree? Otherwise what can I do to get into the security field?

    NetworkingATE1,545 pointsBadges:
  • DOS Attack

    Hello there This is Faisal Rafiq, I have a problem after Dos attack. I got an error "ISA Server detected routes through the network adapter live that do not correlate with the network to which this network adapter belongs". Thanks & Regards,

    239069370 pointsBadges:
  • Efficiency differences between circuit switching and virtual switching

    Which is more efficient: circuit switching or virtual circuit switching and why?

    NetworkingATE1,545 pointsBadges:
  • How to (encode) a editable field in Lotus Notes v6

    Can some one help with a formula that will change the text being typed into a field to X`s. Like a password situation so the password cannot be read.

    Lamy40 pointsBadges:
  • User Name and Password Prompt when opening Outlook 2000

    A user needed to work on another computer on the network. She logged on to the machine with no problems. When she tried to open outlook it prompted her for a user name domain and password. Why? That was the first time the prompt has ever showed up. Normally when a user logs on to a different...

    Jmello0 pointsBadges:
  • Weird sharing problem in LAN after upgrading switch

    Hi, first sorry for my bad English. Recently my company did a network upgrading (changing several units of old unmanaged 100mbps switch to a new managed 1gbps one, and do a correct new backbone cabling to avoid looping coz old cabling is a total mess). Everything went fine for a while. Then...

    Abang5 pointsBadges:
  • Cisco PIX emulator for VMWare?

    Is there any Cisco PIX emulator to work under VMWare? I'd like to build a virtual network identical to the real one, so I could always test in the virtual environment before applying any change to the real one.

    Horus5 pointsBadges:
  • Login syntax for ESX 3.5

    Hi all, I'm trying to get WINscp to log into ESH 3.5 so I can copy the VDMK's to a NAS box as a backup procedure, however not sure why I am getting access denied etc. I have put the entries for the firewall SSH client TCP 22 in and trying using scp or sftp. root@hostname.domainname.net.nz and...

    NZSolly15 pointsBadges:
  • ISA Firewall 2004 – Blocks all clients?

    Hello, I recently did a swing migration and we are now up and running on a premium windows 2003 Small Business Server. The server is the Domain Controller, exchange server, DHCP and DNS server. So everything was workig just fine and I went to install the ISA firewall which comes with the premium...

    Adambeazley0 pointsBadges:
  • Who is responsible for the Firewall

    Our information Security department is different from the network group. Currently, we have Check Point firewalls running on Nokia boxes (IPSO image). The Network group handles the installation, upgrade, routing and IP address specification etc on the firewalls, while Information Security writes...

    Muneanya0 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following