• Cobit implementation

    I have been brought in to implement the Cobit Framework at a medium size company with about 200 IT staff. Management needs to hear some success and failure stories to better understand the methodologies for implementation. I have full access to ISACA, IIA, ITIL, etc., but I would like to see some...

    Raybiederman5 pointsBadges:
  • Group Policy

    there r two group policies applied in two diffrent groups first group is sales and second group is purchase. there is a data server in which there is a folder named marketing, the users who are the members of sales group have the right of read only and the users who are the member of purchase have...

    Biren10 pointsBadges:
  • SharePoint stopped sending email notifications after SSL installation

    Mod: This question was submitted to our Moderator inbox. There is a issue tracking system developed by some other developer (on vacation) and it was working fine until sometime back it seems. The flow was issue is logged --> it goes to SMTP server (located in some other country) -->email...

    BrentSheets6,925 pointsBadges:
  • Guest Access IAS policy

    I am trying to set up guest access of 802.11 wireless access points. My IAS policy puts domain computers into vlan1 and on the AP they show "Forwarding Allowed". I have set up a policy which recognises the mac address of my test guest and on the event log this is shown as a successful...

    Jrubinstein70 pointsBadges:
  • ISA server blocking all access – How do you configure correctly?

    We have a small network with two servers. One exists solely as a file and print server, the other is running Server 2003 as a Domain Controller, DNS server and Exchange server. We are looking at deploying ISA 2006 on this domain controller so I duplicated the PC into a virtual machine as well as...

    Justinj20 pointsBadges:
  • Is it possible to migrate outlook.pst file to another user?

    Recently had MB failure that resulted in having XP-home edition failure. No back up of OS -it was "refurbished". Installed XP Pro and set up new user accounts. Need to recover contacts from old Outlook. I get a Permission Denied message when I try to import into Outlook 2003. Suggestions?

    Dvsmith865 pointsBadges:
  • SQL 2005 and Security Account Delegation

    I read this feature for SQL2000 SP3 but I wonder if this is still valid for SQL2005 or, if it has changed which is the new feature that enables to retain the authentication credentials of the original client.

    alessandro.panzetta9,725 pointsBadges:
  • Windows XP power settings not staying…

    The setup: Server: Windows server 2003. Workstations: Windows XP Mandatory roaming profiles. All computers login as the same user. I do not want the computers to go into standby or hibernate or turn off the monitor. I have configured mandatory profiles, set the workstations into 'Presentation'...

    Skepticals0 pointsBadges:
  • Share outlook calendar between two trusted domains

    Hi, could anybody help me with the sharing of a calendar between two trusted domains? I dont know how to do it. Thx

    Patriccck45 pointsBadges:
  • Is it possible?

    Is it possible to become an expert in antivirus protection management and configuration (to be able to fine tune your centrally managed antivirus software in a mixed environment that includes different types of systems: Windows, UNIX, Linux), complex network topology with LAN, WAN links, various...

    NewR10 pointsBadges:
  • Keeping non-redundant devices up during a power failure

    I need to connect several AC redundant appliances (Servers, Load Balancers, Switches, Firewalls, etc) to other non-redundant ones (SAN Switches, KVM). I have AC PDU’s for redundant and non-redundant devices, but I haven’t figured out the best way to avoid my non-redundant devices being cut off...

  • Open Source OS security

    how security and protection are implemented in an Open Source Operating System?

    Pnyjaems5 pointsBadges:
  • wireless vlan

    hi all, is it possible to have one link from a switch to an access point and split the network into two networks a wireless network from the AP and a wired port for a user connected thru RJ45 and still keep it secured.

    92220990 pointsBadges:
  • Why do IT projects fail?-3

    Hi, I'm a Computer Engineering at CSU Chico. I'm conducting a research paper on "Why IT Projects Fail". If someone could give me an example of a failed projects, "failed" meaning that it didn't get finished on time, or the final project did not meet the requierments. Also if you could give a quick...

    Dbrazeau10240 pointsBadges:
  • IOS setting

    what is ios setting for D LINK CABLE?

    Sh20 pointsBadges:
  • Wireless network connection problem

    I'm having trouble getting a 4 year old (approx) Packard Bell PC with XP and SP3 installed with a Netgear WG311T wireless network card to connect to my TP-Link TL-WR841ND wireless router. I have the routers security set up as WPA-PSK/WPA2-PSK Passphrase. I have tried the network card in another PC...

    Bearcat7805 pointsBadges:
  • Looking for ISO backup system

    I'm looking for an easy to use ISO back up system. Ideally the “kit” would consist of a large USB Harddrive to hold multiple drive images and a bootable CD to allow backup and recovery. This program: http://www.drive-image.com/?GGLAW900 Seems to fill the bill. Does anyone have any experience...

    Flame14,925 pointsBadges:
  • SQL Injection Removal

    How can i remove all instances of the following from my database? <script src=http://www.jic2.ru/script.js></script> thanks Bosco

    Bosco32225 pointsBadges:
  • Can we install McAfee Antivirus in Brightmail Server

    We have Bright Mail server with Symantec Antivirus 10 ver. We are facing problen in that server which is Inetinfo Error in Bright Mail Server due to this mails queue's are reaching more than 40000. Then we uninstalled Symantec Antivirus. Pleasse adviced can we installed Mcafee antivirus in Bright...

    94465 pointsBadges:
  • Wireless data communication

    According to my understanding if data has to travel through wires and beyod a point it has to travel in a wireless environment, the data is decrypted at the access point and will again be encrypted here depending on what encryption technology the access point is using. Is it correct? Please correct...

    Rahul Shrivastava330 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following