• finger scans for federal background check

    Can radiation, or other harmful rays come in contact with the body, when using electronice finger scans for such things as background checks?

    Kstranger2315 pointsBadges:
  • Need help configuring Cisco ACS

    I'm configuring a Cisco ACS and now I have this problem: The Authentication of the IETF Radius-server operates properly but the authentication of the NAC doesn't work. All clients come in my quarantine-VLAN. In the logs there is the SharedRAC: Quarantine_RAC displayed. I had configure 3 components...

    NetworkingATE1,545 pointsBadges:
  • cisco pix 501 as router

    does a pix work as a router

    Voicenextgc5 pointsBadges:
  • Block user Internet access but not ability to read Outlook Express email

    I wish to block Internet access to the single PC user but still grant permissions to Outlook Express to be able to see the emails? If this is possible, would someone explain how? Thank you.

    NetworkingATE1,545 pointsBadges:
  • FTP permission

    DO we require domain admin rights for providing FTP access or permissions on folder?

    SCCMadministrator5 pointsBadges:
  • I need your input

    Howdy folks, I have the following set up: 2 Domain Controllers - Win2k3 Standard 1 member server with Exchange 2003 Standard 100 XP Pro workstations T1 connection Currently I use a sonicwall Pro 200 firewall, Symantec Corporate edition 10 AntiVirus, and Symanted Mail Security for Exchange....

    TheVyrys0 pointsBadges:
  • SAP Security outside in

    Question, I came to this company 1yr ago and noticed immediately they had not implemented Security!!! SAP_ALL for everyone in Production!!! So as my second BIG project I took on, Security. In building the profiles for these people I came across 2 problems which are holding me from rolling out these...

    1112gene5 pointsBadges:
  • Incoming mail after ISP change

    Hi We changed the ISP and mail stopped flowing, both incoming and outgoing. After working on the exchange server, outgoing mail started flowing through the ISA 2004 as a smart host. Outgoing mail is perfect and the internet connection is very stable (1Mbps). I dont know why i cant receive incoming...

    Ccbekas200215 pointsBadges:
  • Data Scrub in Oracle 10g

    I am looking for algorithm for Data Scrub in Oracle 10g - I work with sensitive data and I need to get some help as to how to go about this and if any body can come up with some codes, I really appreciate that. There are some ready made softwares available, but I am interested in getting to know...

    Jug5 pointsBadges:
  • Configuring SMTP Authentication for outgoing mail

    sir I am working on exchange server in an organation were any user can send mail with out authentication, so there is a chance for any user to send forge mail ids, so avoide this please help me enabling SMTP Authentication in exchange server 2003, so that each time user has to give his username and...

    EXCH200335 pointsBadges:
  • Remove AD User object that is inheriting permissions

    I have an old user account that belongs to several distribution groups. The user WAS a member of the Domain Administrators group, but has been removed from that group, and now only belongs to Domain Users group. When I attempt to move this user from a dist list, I get "You cannot remove this...

    Jrlokken35 pointsBadges:
  • How to limit users to downloading file size limit?

    hi all, I am sandeep .I have ISA 2004 Server, how can I limit the download File Size? example not to allow user to download files bigger than 10MB

    Kapadane105 pointsBadges:
  • Configuring a Foundry Switch

    I am not a Network Specialist, but I do know a small amount about configuring a CISCO switch. However, I have been asked to configure a Foundry Switch. I am having problems with a few commands and maybe someone out there can help me out. Here is what I'm getting when I try and configure this...

    Louann5 pointsBadges:
  • Read Only Table

    I create a table in sql server 2k5, the script is look like this: CREATE TABLE [dbo].[tb1PmtD]( [PmtDLU] [int] NOT NULL, [PmtDInvLU] [int] NOT NULL, [PmtDAmount] [money] NOT NULL ) ON [PRIMARY] GO ALTER TABLE [dbo].[tb1PmtD] WITH NOCHECK ADD CONSTRAINT [tb1Pmttb1PmtD] FOREIGN KEY([PmtDLU])...

    Ipong40 pointsBadges:
  • To connect to a wireless network?

    I am trying to connect to my company's wi fi network. Is it neccessary to know the SSID name and the WEP Or WPA key? Also can we try sniffers like aircap to gather and capture the required credentials. Do tools like these capture the SSID name and the encryption key also?

    Rahul Shrivastava330 pointsBadges:
  • File size download limit using ISA or any other tool

    I want to limit my users to download upto specific file size to download.

    Loveislife20 pointsBadges:
  • Cisco Site to Site DMZ Question

    Server A: 192.168.1.219 Server B: 192.168.2.220 10.10.10.10 1 gateway at 10.10.10.1 on Server B. Server A needs to connect to Server B. A can ping anything on 192.168.2.x but it cannot ping 192.168.2.220. Server B has two nic cards, hence two IP's, the internal of 192.x and the dmz 10.x. The...

    bradob160 pointsBadges:
  • Have you tried XVT Cross Platform Studio 2008?

    Is anyone aware of XVT? You can build C/C++ applications and compile the single source on any of 14 platform/OS combinations (windows, mac, unix, linux). Anyone tried it free? Anyone using it? www.xvt.com

    EnPassant5 pointsBadges:
  • Community Update: New Member Contest Win a XBox 360 this month for your participation.

    After a long, stressful day in IT, video games can be a great way to unwind and relax. That’s right, you know where this is leading. It’s time for a cool new contest on IT Knowledge Exchange. The month of September ( Sept 1-Sept 30) is your chance to get your hot little hands on your very own...

    ITKE54,720 pointsBadges:
  • windows xp security tips

    i am going to be storing a windows xp sp3 based tower for a period of months while travelling. while the tower will be relatively secure, i'm unfamiliar with newer password cracking techniques, as i've never had to implement them. all sensative data on the machine is encrypted using fips algorithms...

    Redbird15 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following