• DosCreateMutexSem privilege escalation

    I am looking for an explanation of how a privilege escalation hack would be able to be inserted with a call to doscreatemutexsem function from a windows service that is running under the local system account.  I was unable to find anything on Google and not being a security expert I just don't see...

    CarlCioffi345 pointsBadges:
  • Receiving error message connecting to SQL Server 2008 R2

    I'm trying to connect to SQL Server 2008 R2 using Windows authentication. However, I can't because I keep getting this error:Login failed for user 'AVATOPIA\ian'. Reason: Token-based server access validation failed with an infrastructure error. Check for previous errors. [CLIENT: ]Now, I can log in...

    ITKE54,710 pointsBadges:
  • Scanning Active Directory for weak passwords

    Is it possible to scan our active directory and see if people have weak passwords? We have upped the password policy but what about for users that already have passwords and are not scheduled to changed them yet?

    Troubleshooter24755 pointsBadges:
  • Controlling VPN access

    Here's my scenario. I fall under guidelines of HIPAA. I have mobile users using laptops and tablets loaded with Cisco VPN CLient connecting to my Cisco 2811 ISR which functions as my router/firewall/VPN. I am using Micorosoft AD in my domain. To authenticate users to the domain. Is there an easy...

    Gforsythe75 pointsBadges:
  • Cache-based side channel attacks

    Please help me find a new secure mechanism against cache based side channel attacks in the cloud. I found that ieee published a method for security against AES, RSA, BTB attacks to retrieve the secret key. It is architect based method. Can I do any modification to this work after implementing this...

    mvidya199020 pointsBadges:
  • Error Code 64: Host not available – ISA error

    Hello Sir;   When I am accessing the  internal website from other system, I get below error. How can I bypass internal broadcast  from ISA server?   I alread bypass from  broweser's internet option but still same issue.   With Regards Bhupendra Jesalpura 9426372705

    BhupenJesalpura10 pointsBadges:
  • Converting fron a cisco 1841 router to a Cisco 2900 router

    My IT group bought me a 2900 series router to replace my 1841.  How do I copy the program from the 1841 and paste it to the 2900?  The reason for the change is due to needing more external ports.

    wyowool5 pointsBadges:
  • Delivery Failures for mail I did not send – Spoofing or Trojan

    I'm getting delivery failures for email I didn't send. It's probabaly someone spoofing my account, but could it be a trojan sending emails directly via SMTP? How can I tell? Is there a way to query the SMTP service for a list of sent emails?

    Eag5 pointsBadges:
  • HIPAA audit on virtual network

    I'm hoping to find a solid, inexpensive network auditing tool for virtual networks as prep for a HIPAA compliance audit. Does anyone have suggestions of open source or pay tools they'd recommend? Do I need to pull in an outside party for this?

    Michael Morisy7,943 pointsBadges:
  • FOXPRO 2.6 FOR MS DOS DATABASE CONVERSION

    I have a .dbf file from my dental software (FOXDENT V7.0B) MS DOS program that allows the printing of a standard 1994 American Dental Association form. HIPAA is now requiring the 2006 format- Mostly the government and Medicaid forms. Can anyone help me with this conversion as this software has...

    Cephid5 pointsBadges:
  • Personal E-mail at work (aol, gmail)

    I am looking for documentation to support blocking personal e-mail at work(aol, comcast, hotmail etc) for virus and HIPAA compliance regions. Can anyone direct me to any publications that support this? Thanks!

    Itadmin34775 pointsBadges:
  • Network Security Auditing tools

    Hi all - I'm hoping somebody out there might have a suggestion for me. My company unfortunately falls under Sarbanes Oxley and we need to audit all of the network directory security. The down side of this (ok well it's all down) is that we are a small company, no money to spend on getting the...

    Lirria0 pointsBadges:
  • Windows 2003 Server configuration

    I have been asked to configure a new server for a small Health care clinic. Previously they were using a Dell Dimension as a file server with open shares throughout the network and all users logging in as administrators. Considering the risks involved with HIPAA (Health Insurance Portability and...

    Stuntz0 pointsBadges:
  • Help

    What is the importance of HIPAA and security in an electronic health record?

    Bella4mommie10 pointsBadges:
  • Corporate laptop security/encryption

    Please can anyone offer any guidance or know what are the best products in the market place for encrypting/securing corporate laptops, preferably the solution should include hard disk wiping.

    Troubleshooter24755 pointsBadges:
  • Alternative web filtering software

    Are there any free alternatives to the horrible web filtering software that we have been using called Websense? We have no real needs other than monitoring and blocking urls based on categories.

    NewnanIT1,110 pointsBadges:
  • Securing Windows Server 2008

    What is the best way to lock down and secure a Windows 2008 server? We want to block all remote connections and secure passwords and what not.

    TeachMeIT975 pointsBadges:
  • Email from Chris Leonard from TechTarget urgent alert of security breach

    PC has/& is, being hacked into every time i log-on? I'm a novice, not a techie, only know usual computer usage. Have tried all I can, & I'm having a terrible time stopping it? THINK I HAVE SESSION HIGHJACKING? I do not know how I came to even get an email from your organization? Are you...

    colette7me30 pointsBadges:
  • Restrict my clients to use USB flash disk

    To whom may it concern, Currently, I'm running a server 2003 enterprise for my domain (DC) and for now, want to restrict my clients to use USB flash disk but not sure how to do it. Please show me how to do it. Thank you. Regards Harry

    Harrythong15 pointsBadges:
  • Authentication

    What are the things an organization can do to strengthen the use of username and password authentication?

    emmaculate5 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following