I get the below error when trying to run a backup job. The service credentials have not been changed. I changed the password on the server, updated BE with new info, and same problem. Created account on the machine locally and same thing. Test runs are successful. So, the username/password should be fine. This server [...]
Answer Question | January 2, 2008 2:45 PM
Backup, Symantec, Symantec Backup Exec 11D
Hi Can we the change the SID of an object ? When should we do it & how to changed the SID of an object in Active Directory environment. Thanks in advanced.
Answer Question | January 3, 2008 9:43 AM
Active Directory, Windows Security
Your Intranet Web server has been attacked by unauthorized external users. Company management wants you to recommend an effective security solution. Which should you suggest?
Answer Question | December 31, 2007 3:08 AM
I have a domain running 2000 server and need to disable the delete capability on certain users in certain folders. How do I disable the delete permission on network folders that contain Excel files? I’m able to set the permission through the security tab in folder properties & it works for Word files. But when [...]
Answer Question | December 22, 2007 8:33 PM
Permissions and settings, Windows 2000 Server
a staff member was given the job of creating a new security dir and moving the data from the old to the new. what he did was to delete the user and they chould not log in, create a new login for them we are using microsoft 2003 server, under XP pro. anyone know how [...]
Answer Question | December 22, 2007 5:33 PM
Security, Windows Server 2003, Windows XP
what is the best free anti-virus program available?
Answer Question | January 26, 2012 2:01 AM
I am trying to run a resultant set of policy (logging mode) on pc’s here in the office so I can get an idea of where things stand from a patch management standpoint. I am unable to run RSOP on a small handful of pc’s; it attempts to run and errors out, telling me to [...]
Answer Question | December 20, 2007 5:10 PM
Patch management, Remote access policies, RPC, RSoP, WMI
we have disabled access to many instant messenger programs, however we use winchat to communicate with each other, my question is whether or not some sneaky csr(customer service rep) finds access to this program, can we monitor the conversations thru it? we dont want to restrict access on all the pc’s per when we use [...]
Answer Question | May 20, 2011 9:16 PM
Chat applications, IM security, Instant Messaging
Do desktop firewalls work in “realtime” environment?
Answer Question | December 18, 2007 10:20 PM
Desktop, Desktop firewall, Firewalls
I need a way to log the key strokes of an AS/400 user (on green screen). I want to know everything entered, including menu option numbers entered on
Answer Question | December 19, 2007 5:45 PM
AS/400, Keystroke logger, User monitoring
how can a site detemine that high traffic is reasonable?
Answer Question | December 16, 2007 6:18 AM
I have a lotus workflow web enabled application and i would like to access it with the user and password of windows with out log in again. How can i do this?
Answer Question | December 17, 2007 10:05 PM
Lotus Workflow, Single sign-on
Could the more recent predictions about targeted attacks moving from attention to pay-off be actually because after the industry was starting to take the subject more seriously than lip-service, had the effect of eliminating the noise so that now we can hear the state sposored pin drop?
Answer Question | December 2, 2010 2:09 PM
Security and commodity brokers, Security threats
Is there any Cisco PIX emulator to work under VMWare? I’d like to build a virtual network identical to the real one, so I could always test in the virtual environment before applying any change to the real one.
Answer Question | February 5, 2009 3:49 PM
Cisco emulator, Cisco PIX, PIX, VMware
My company has an Enterprise Certification Authority running on a domain controller. The Enterprise CA was installed to deploy computer certificates to be used for authentication with a wireless system. In the Certification Authority snap-in, next to the “computer” certificate template in the POLICY folder, the intended purpose is listed as “client authentication, server authentication.” [...]
Answer Question | January 29, 2008 9:54 PM
Certificate authorities, Group Policy, Security
We have been utilizing an encrypted folder on a thumb drive with our users and exporting the encryption certificate onto another thumb drive for back up purposes. Is it possible to set up a master drive with an encryption certificate already in place and use it to clone other drives? Our boss wants to avoid [...]
Answer Question | December 11, 2007 9:48 PM
EFS, Thumb drive
How does CISSP compare for industry acceptance against other certs ? And is the valueo fthe CISSP increasing or decreasing in IT market.
Answer Question | December 11, 2007 5:53 PM
Dear Sir, We use Exchange 2003 and Trend Micro IMSS 7.x, sometimes messages are bouncing back to the sender. Please refer to the email below which I sent from my gmail account to my company account and it bounce back. Kindly assist, Thanks and regards, Ziad Diagnostic code: smtp;552 ekfcegw.emiratesabela.co.ae: your message counts in one [...]
Answer Question | February 7, 2008 3:46 PM
Exchange 2003, IMSS, SMTP
While trying to craft answers or questions, I may frequently check other websites. This has the effect of breaking the authentication on IT Knowledge Exchange, forcing me to re-authenticate. Would Extended Validation resolve this issue? or is it something to do with the other website authentication spoofing a cross-site violation?
Answer Question | May 31, 2008 3:05 PM
ITKE, Security, securtity software
Anyone know who the major IT security industry organizations in the USA are?? Would be grateful for a listing, etc.
Answer Question | December 11, 2007 11:11 PM
IT security, Security Industry