• Launching Smart Clients on Citrix

    We use Citrix to allow our remote users to launch smart client apps on their machines. Unfortunately our users have to download smart client apps every time they log on via remote Citrix server because their user profiles are purged each time they close their session. Is there a way to maintain the...

    ITKE342,785 pointsBadges:
  • USB port security

    I have a user that needs their USB port to be able to save data in their USB drive. For security purposes the USB drive is not able to save data into any USB drive but they are able to view data on a USB port. That was approved by corp and I need to know how to do this. How do I enable the "save...

    ITgeeks35 pointsBadges:
  • Regarding SFTP

    I am not a AS/400 programmer but overheard my colleagues and suggested them to use SSH. Greatly appreciated if anyone can suggest here... They have a batch job which creates a text file containing the sftp command passing IP address, username, password and the file to be transferred. I suggested...

    bijunator5 pointsBadges:
  • IT

    If company A attacks company B, how should the company A address the issue? What is the possible solution?

    RANARANA5 pointsBadges:
  • What are the costs involved in having a product certified

    I have a product that I want to get listed on the certified product list. How can I do that?

    dzerna5 pointsBadges:
  • Is it possible to stack a Catalyst WS-C3750X-24T-L with a WS-C3750X-12S?

    Is it possible to stack a Catalyst WS-C3750X-24T-L with a WS-C3750X-12S?

    Lilirouter135 pointsBadges:
  • Bonded ADSL Routers Cisco 1921

    Hi, everyone, My ISP (Enta) have started to do Bonded ADSL. The hardware they recommend is a Cisco 1921 - I'd also need a couple of ADSL Modules - this brings the price to over £1000 - bit too much for a broadband router. However, I'm told that I can connect multiple Netgear DG834's as they have a...

    flowerlee85 pointsBadges:
  • Key Loggers and Root kits

    Hi All, It seems my company is affected by key loggers and root kits and malware. Would you people suggest if this can be cleaned and controlled at perimeter level with help of ASA firewalls, IPS things of that sort? Can we tight the security for these kind of issues with ASA firewall at perimeter...

    raviv073110 pointsBadges:
  • Will litigation against Huawei affect me as a buyer?

    I have been working on assessing a few leading network equipment vendors in the likes of Cisco, HP, Juniper, etc., to procure Layer 2 switches. I am currently assessing the capabilities of Huawei and i have been hearing about a litigation raised by Nortel (Avaya) against Huawei on their Layer 2...

    Unified Communications ATE2,125 pointsBadges:
  • Router Cisco 2800

    How to restore iOS Cisco router 2800 card reader?

    abdoukh5 pointsBadges:
  • Preventing command prompt access except by domain admin

    Can we prevent command prompt access on all servers except for when run by a domain administrator?

    NewnanIT1,110 pointsBadges:
  • Using the free reverse engineering malware tools in REMnux

    Hi Experts, I have seen Keith Sir's(Keith Barker)Video on REMnux. This seems to be powerful. I have somewhat understood the video. Had little queries. Kindly guide/suggest.I Just wanted to understand if this can be implemented on production as VM and scan through the infected windows...

    raviv073110 pointsBadges:
  • Skinny website

    Website studyspanish.com appears small and skinny on Firefox. How can I fix this?

    WeeLassie15 pointsBadges:
  • Microsoft Virtualization live expert chat: 3/31, 11:00 am EST

    Edwin Yuen, Microsoft Virtualization expert, will be with us March 31st from 11 - 3 EST here on IT Knowledge Exchange to answer your enterprise virtualization questions in a live chat. Join us on the Microsoft Virtualization blog 11:00 am EST on March 31st to ask Edwin your toughest enterprise...

    JennyMack4,280 pointsBadges:
  • Screen saver

    How do I set up a security question for my screen saver?

    katydid405 pointsBadges:
  • Working on getting into the field…

    Hello anyone and everyone! My name is Marty and I am working on getting into the Information Security field so I have a lot of questions. For now though, I will post just this one to start. I am 45 and a Disabled Veteran starting late, obviously, getting into the field, so what are the most...

    MockLife5 pointsBadges:
  • How can I install Windows XP by USB with an ISO?

    I have a Windows XP ISO. I want to install windows by using USB.I have tried to transfer ISO by using this utility "Windows 7 USB DVD Download Tool", but I shows error "The selected file is not a valid ISO file. Please select a valid ISO file and try again".While ISO file is working. I have burnt a...

    Xaphar220 pointsBadges:
  • Implementing a Security Policy Within an Organization

    Hello everyone,My name is Trevor, and I'm a student at UAT, doing some research on different implementation frameworks for establishing a security policy. In particular, I came across the SKiP (Security Knowledge in Practice) framework, and saw some advantages and disadvantages.This framework has 6...

    tlawren35 pointsBadges:
  • Buffer overflow detection technique

    which is the best buffer overflow detection technique?

    Ta5 pointsBadges:
  • Free Chapter – Hardening a SQL Server implementation

    Another free chapter download is available on the IT Bookworm Blog. Written by: Ross Mistry and Hilary Cotter Book: Microsoft SQL Server 2008 Management and Administration. Overview: “If you need to deploy, manage, or secure Microsoft SQL Server 2008, this is the complete, fast-paced, task-based...

    BrentSheets6,925 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following