• Can I use a GPO to stop users from changing information in Windows folders?

    Our company has a share called "ClientStore" where we store all client information. Within the "ClientStore" folder we have a letter for each letter in the alphabet. Then we have another folder with the client's company name within the folder that the client's company name starts with. Then we have...

    Windows Security ATE160 pointsBadges:
  • How can I allow access to shared folders with Active Directory?

    How can I allow a user to access a shared folder by using Active Directory? I want only this user to be able to save data in this folder and to do so from any computer.

    Windows Security ATE160 pointsBadges:
  • How do I deny delete permissions?

    I am on a Windows Server 2003 environment and I am currently working on folder permissions. Here is a small diagram of folders: Folder A / B C / / D E F G I am trying to deny deleting folders A, B and C but still allow users below that level to delete and perform permission changes. The problem is...

    Windows Security ATE160 pointsBadges:
  • Determining RTO and RPO

    What questions can be posed or analysis can be done to determine RTO? What questions can be posed or analysis can be done to determine RPO?

    Carollarsen5 pointsBadges:
  • How do I know if my patches have actually been implemented?

    When I patch my Windows servers, how do I ensure that the patches have actually been implemented?

    Windows Security ATE160 pointsBadges:
  • Do old certificates pose a security threat?

    From our Windows Server 2003 Web server, we are using Windows certification services for issuing certificates for our clients. After issuing the certificate to the client, the certificates are stored in the server. Is there any way to delete the issued certificates from the server? Do they pose a...

    Windows Security ATE160 pointsBadges:
  • MAC Addresses

    How can I locate a stolen desk top being used on the internet if I have got the MAC Address for the onboard network adaptor card

    Mozie10 pointsBadges:
  • Cisco pix501 VPN at home.

    A question submitted on SearchNetworking.com I just got IPSEC passthru working. IPSEC passthru is the most important feature because from home I have to VPN back to ASA at work. I would also like when I'm at work to VPN back to my home (VPN the other way that terminates on my pix 501) This should...

    ITKE357,205 pointsBadges:
  • Unauthorised access to Email and internet banking

    Is it possible that someone could hack into an email account (without changing your passwords), send and recieve emails from your hotmail account while making it look like it came from your IP address, set up fake dating site profiles in your name (with all of your details, photographs etc) , and...

    Lucy15 pointsBadges:
  • Limiting Accounts

    I want to configure an account limiting its abilities to: 1)It cant install any application 2)restrictions on web 3)Accessing my local drives (eg D:) not the Windows Partition

    Sangay635 pointsBadges:
  • Can I encrypt BlackBerry email with the certificate used in Outlook?

    We are trying to implement an email encryption solution for our users. Our environment is Exchange Server and Microsoft Outlook 2003. Top management at our company use BlackBerry. We chose the VeriSign Digital IDs certificate to encrypt and sign email with S/MIME in Outlook 2003. We would like to...

    Exchange Ask the Experts580 pointsBadges:
  • How to NAT a VPN pool address

    I have a PIX 506e IOS 6.3(5) and I want to make a VPN pool address available to inbound traffic. The scenario is that I have a wireless device which is behind a firewall from my provider. I have a VPN set up to allow the device to connect and it is assigned an address from a VPN pool. I would like...

    TomWahl85 pointsBadges:
  • Change copier FTP anonymous access

    Retina network security scanner shows FTP anonymous write access as a vulnerability. I only need FTP anonymous for a networked KonicaMinolta Di551 copier used for scanning documents to PDF file format into a folder on the server. Does anyone have any idea if a copier can scan to a network folder...

    Gekko115 pointsBadges:
  • Unsuccesfully securing an automated secure transmittal of data through FTPS protocol

    We have been unsuccesful in securing a data connection with our vendor's FTP server. The failure is always during establishment of the data connection when SSL is enabled. On our end, we've tried sending test files through two different server sources, and still were unable to connect with our...

    KMW5 pointsBadges:
  • computer based and user based policy implemented together?

    computer based and user based policy implemented together? I am setting up a squid proxy server. To deploy it I want to setup computers such that I can have any user log into a particular workstation and have limited access but when he connects to another workstation(that does not have any group...

    Sheldon.sc140 pointsBadges:
  • SQL 2000 to Yukon Migration

    We have 4-5 applications on the front end of a portal. On the backend we have mapped these applications to SQL server 2000 Databases. Now, we are planning to migrate on the backend databases to Yukon and map it to the application on the front end. My question: Is it possible to use Yukon for one of...

    Kilaru0 pointsBadges:
  • Can I call upon the username of someone logged into the pc, and use it in a web link?

    Hi all, Basically, I've got a webpage I'm working on, and I'd like to be able to provide a link in that page, that will take a user into their home folder on the network. Since it'll be different for each user, but it uses their username as their home folder, I'm thinking there must be a way, to...

    Linger19740 pointsBadges:
  • Dynamic updates to a DNS Server

    What Windows Operating Systems support dynamic updates to a DNS Server? Which service needs to be running on the clients?

    1111100 pointsBadges:
  • What is NAT port forwarding?

    Describe in brief how you would set up port forwarding on a NAT router to allow a PC on the LAN to publish its web to the internet.

    1111100 pointsBadges:
  • Advantage to expand IT networks to enable physical security applications like IP video

    A questions emailed to us Is there a clear advantage and ROI to expand IT networks to enable physical security applications such as IP video. These applications typically require significant bandwidth resources.

    ITKE357,205 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following