I could go on and on about this but rather than recreate the wheel, here’s my main tip: focus on yourself. That is your communication skills, your business skills, your time management and goal setting skills. A wise man named Earl Schoff once said, “Learn to work harder on yourself than you do on your [...]
View Answer | February 19, 2013 9:10 PM
What’s the context? More information would be helpful. Thanks.
View Answer | February 6, 2013 6:01 PM
Security, Security management
It’s as big of a risk as your organization (management) is willing to let it be. The reality is whether or not you tell people that they can use their own mobile devices on the network, for corporate email, information storage, etc., they’re going to find a way to do it anyway. Why not set [...]
View Answer | February 12, 2013 2:10 PM
BYOD, Security, smartphone
Firstly we can help you more if you post some code to examine. From what i gather, your problem has to do with your loops or threads in the program. You need to retrace the code to see what gets executed when. You should create a method and give it a name like getToss() which will [...]
View Answer | January 18, 2013 4:41 PM
Class, Inheritance, Java, JWindow, object, Swing, Threading
The answer is very simple! If you use two antivirus software at the same time the two antivirus features would collide and cause damage to your system! Its better to go with a antivirus software that has the high security features enclosed in it. There are dozens of free antivirus software that exist which are [...]
View Answer | January 21, 2013 8:25 PM
Antivirus, Antivirus software
I would make sure your computer is as clean as possible after this. Scan with your AntiVirus, clear cache & cookies, block the email address you are receiving the threatening emails from. Good luck!
View Answer | January 18, 2013 3:02 PM
Your ping tests tell you that your routes are working fine. You don’t need to worry about the RV042G configuration as that seems to be configured perfectly. Name resolution is in your DNS settings. On your DNS server in LAN1, you should create a new Forward lookup zone for the domain name for LAN2 and [...]
View Answer | January 18, 2013 7:44 PM
Cisco router, Subnets
I suspect that all you need to do is add a route into your network for the subnet allocated to the VPN users. You can do this on the fast Internet ASA, but will also need to put this on the MPLS router, and/or other routers in your network or via a routing protocol if [...]
View Answer | January 22, 2013 6:39 PM
Simple answer. RIP doesn’t learn route of OSPF or EIGRP and vice versa. Router 1 doesnt know te route Router 2 subnet. So Router 1 discard the packet.
View Answer | January 18, 2013 5:11 PM
Cisco, Cisco router
When you’re in global config mode, you should have the option to enable the ” ip http secure-server ” command. If you’re not seeing it, the only one reason that comes to mind of why it would be gone, is if you’re using different views for different users that have been assigned certain privileged level and may [...]
View Answer | January 10, 2013 11:40 AM
Cisco 2801, Cisco router
What you should NOT do is post a username and password on a webpage that can be read by anyone. If you have problems with an account on a site, contact the site themselves.
View Answer | January 5, 2013 1:36 AM
Login, Login error
To stop this immediately, create an access list on the ASA that only allows traffic to come from the IP address of the Proxy server. You may also need to allow some specific traffic from other servers, to allow for services such as software updates, NTP or others. Better will be to separate the Internet [...]
View Answer | January 2, 2013 3:57 AM
Cisco ASA 5520, Cisco Firewall
so it’s not clear what you expect. If a browser can’t access the source code, how do you expect the page ever to get rendered for anyone to see? Jual Baju Wanita | Jual Baju Wanita | Jual Baju Wanita | Jual Baju Wanita | Jual Baju Wanita | Jual Baju Wanita | Jual Baju [...]
View Answer | May 17, 2013 5:30 PM
It is likely that you will need to reconfigure the VPN devices at both ends to reflect the new subnet, and include it in the traffic that needs to be encrypted. You will also need to change the routing at the central site to include this new subnet. Once this has been done, then reset [...]
View Answer | January 2, 2013 11:22 AM
Firewall, VPN connection
You will need to know the password.
View Answer | December 31, 2012 4:42 AM
computer security, Security
Thanks for coming to ITKE. Since you have asked more of a general question, I suggest you do a simple google search and you will find more that enough information to answer this question. If then, you still have a specific question, please come back and ask it.
View Answer | December 31, 2012 3:22 PM
Layer 2 switches, Layer 3 switches
How do you mean? What ports/services are being attacked? DoS attack blocking often needs to extend out to your ISP. Send us more detail and we’ll see if we can help.
View Answer | January 24, 2013 4:51 PM
DOS Attack, Windows firewall
You can do this via folder level permissions. Right click on desired folders, and select Security tab in properties. You can customize the required permissions here. Remember one thing: Negative permissions i.e. denied permissions take precedence over granted permissions.
View Answer | December 28, 2012 6:55 AM
The answer really depends on how your Internet connection is provided. If your Internet connection is presented to you as Ethernet, like you get from cable operators, then you have the correct router hardware. However, I would have recommended that you bought a Cisco ASA firewall rather than the router to do this task as [...]
View Answer | December 21, 2012 12:33 PM
Cisco 2811, Cisco router
How about: IT taking steps to keep the business out of hot water with the industry and government regulators up to the point where a breach occurs and it’s revealed that vulnerabilities and risks were overlooked the environment was not as secure as it was assumed to be.
View Answer | January 30, 2013 6:57 PM
Compliance, IT security