• How can I stop spoofed email with Lotus Domino 5 without enabling reverse DNS

    On a Domino 5.010 smtp gateway, who send to internet  from x.x@domain.com and receive from internet to x.x@domain.com, how configure anti spoofing  (users from domain.com oganization receive mail from their own domain  ...@domain .com), of course withour using reverse DNS. thanks.

    Marka755 pointsBadges:
  • Cisco 5510 firewall configuration

    How do I configure Cisco firewall 5510 ASA?

    Van helsing60 pointsBadges:
  • How to identyfy net usage

    I am a system admin in a private company. In my office we have 60 systems and 13 laptops. How can I get each systems internet usage, not through proxy. If anybody has any idea about any tool please let me know.

    Sorry5 pointsBadges:
  • Error 1920 while installing McAfee Antivirus 8.7

    Dear sir, When I try to install McAfee antivirus 8.7, I'm getting error message 1920 McAfee framework unable to start services. Kindly provide me the solution.

    Saibalurocks5 pointsBadges:
  • DOS Attact Message or Just a Simple Query”?

    I have checked firewall alert message everyday from my organization firewall equipment, and it returns an alert message "anomaly: udp_src_session, 1001 > threshold 1000, repeated 214 times" Starting from 172.10.2.45:51158 to 210.181.1.24:53. I wanna know whether it's really infected and...

    RedJason5 pointsBadges:
  • Blocking USB drives or any removable media on Active Directory network

    Can I block the use of USB drives or flash drives or any removable media on our active directory network across the board. We are using group policy but I do not know how to configure it.

    ITKE352,430 pointsBadges:
  • Veritas Backup Exec 9.1

    Need to restore folders from a tape back up to a remote server. The restore is completing but the files are not on the remote server. Any suggestions?

    TOLbackup5 pointsBadges:
  • iPhone will not sync

    Environment; ISA 2006 Front End, Mailbox Exchange server 2003 iPhone will not sync unless Outlook is running on the desktop. Any help will be greatly appreciated.

    SpencerPyne5 pointsBadges:
  • Help logging in

    I changed a computer from work from a domain to a workgroup. Instead of going and changing the user accounts etc my machine restarted. Now I have the Log On To Windows screen with the Username and Password up and it won't accept the Admin account. Neither does it have the drop down list where I can...

    Jade057110 pointsBadges:
  • Extracting all users’ passwords from Active Directory 2003

    I need to extract all users passwords for our next project. How can I extract them from either their workstations or from Active Directory? We are on AD 2003. We have two domain controllers.

    NewnanIT1,110 pointsBadges:
  • A particular IP range Cannot access internet through ISA 2006

    In my organization, we have two ISA servers configured to work in an array. They were configured to allow Internet access from 172.x.x.x series. We had the requirement to allow the Internet from 192.168.x.x series as well. I modified the rule to allow for the same. But in case of 192.168.x.x series...

    Shubham875 pointsBadges:
  • Can’t connect to proxy server

    Unable to connect to proxy server. What do I do to fix it?

    shanville5 pointsBadges:
  • How can I tell who owns what IP addresses?

    Is there a method to tell who owns what IP addresses? I would like to know who owns a IP range that keeps showing up in my firewall logs. Can I pin point it to a company or just to the ISP like I am doing currently?

    Karl Gechlik9,860 pointsBadges:
  • Is there a way to block guest users from downloading active x files on my laptop?

    Is there a way to block guest users from downloading active x files on my laptop? I have prevented them from downloading in my browser but I want more security?

    SAS70ExPERT125 pointsBadges:
  • Internet security and social networking

    What network solution today in the market can block a phishing attack coming from social networking Facebook? i.e. from Facebook, someone who "appears" to be a friend posts a phishing link via a message. A typical web security solution, i.e. web reputation filtering, seems only blocking phishing...

    Richbiz15 pointsBadges:
  • Creating a username and password on a SQL Server database

    How we can create a username and password on my SQL Server database?

    SQL Server Ask the Experts2,585 pointsBadges:
  • JavaScripts are not working in Chrome, FireFox, Safari browsers

    Some of the JavaScript pop ups are not working in Chrome, Firefox, Safari but it is working fine in IE. Why this is happening? Let me tell you in brief about the problem... I have a user login page then when the welcome page is opening there are some pop ups which are not working..ie if some one...

    Advancedjava25 pointsBadges:
  • E-mail hacking

    How can I hack my own e-mail address? Is there software available for this (commercial or freeware)?

    Brainstorm225 pointsBadges:
  • Defense in depth and unified threat management appliances

    Experts tout unified threat management appliances as an ideal antimalware, intrusion prevention and content filtering firewall for midmarket companies. But doesn't this counter the long-standing security practice of defense-in-depth? With a one vendor, platform, and management console, aren't we...

    SearchMidmarketSecurityATE150 pointsBadges:
  • Features around URL Filtering with Forefront Threat Management Gateway

    Can you explain the new features around URL filtering within Forefront Threat Management Gateway? This question is from the Microsoft Live Chat which took place on July 13th.

    ITKE352,430 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following