What password policies are the best without going crazy? We want security but changing passwords 2 times a month is too much. What is a healthy middle ground between security and convenience?
Answer Question | June 7, 2011 8:01 PM
Open IT Forum, Password management, Password policies, Security management, Security policies
What is the best way to lock down and secure a Windows server 2008? We want to block all remote connections and secure passwords and what not.
Answer Question | June 8, 2011 7:55 PM
Password management, Remote access security, Remote connection, Security management, Windows Server 2008, Windows Server 2008 Administration, Windows Server Security
How can I block CDRW/DVDRW and USB drives from being used in our Windows XP machines across the entire network?
Answer Question | October 14, 2011 7:37 PM
Network security, Network Security Management, Network Security Policies, USB port security, USB security, Windows XP
Hi, I would like to know that how can one open computer if he /she forgets password applied to his/her computer? thank you !
Answer Question | June 16, 2011 7:36 PM
Password cracking, Password recovery
If we need to pull Windows security logs remotely what is the best and easiest way using a domain administrator account?
Answer Question | June 2, 2011 7:36 PM
Domain Administrator, Remote access, Remote Access Privileges, Remote access security, Security logs, Windows Security
I have enabled rsyslog on Ubuntu and have my firewall logs going to this system. They are landing in the syslog file and I want them to go to a unique file such as /var/log/firewall.log. I have entered the following line in the rsyslog.conf file, but it doesn’t seem to have any affect. if $fromhost-ip [...]
Answer Question | June 2, 2011 10:51 PM
Cisco ASA, Cisco ASA 5520, rSyslog, Ubuntu
This week’s free IT book, Building Applications in the Cloud: Concepts, Patterns, and Projects, is Christopher Moyer’s guide to help you not just migrate to the cloud, but “use cloud architectural patterns that deliver superior performance, scalability, and availability.” Whether you’re building a new cloud solution or adapting code that already exists, this is a [...]
Answer Question | June 2, 2011 1:35 PM
AS/400, Business Intelligence, Channel, CIO, Cloud Computing, Cloud computing books, CRM, Database, DataCenter, Development, Exchange, Giveaways, IT Books, Linux, Lotus Domino, Microsoft Windows, Mobile, Networking, Oracle, SAP, Security, SQL Server, Storage, Virtualization, VoIP, Windows Server
Is the configuration commands for Cisco Firewall AS5510 are the same for other routers like cisco 2600 series, can I get to know some examples of the configuration for the AS5510, I already checked the Cisco web site for the aobve firewall but not much help. thanks.
Answer Question | June 2, 2011 11:01 PM
Cisco 2600, Cisco certifications, Cisco Firewall, Cisco IOS, Firewalls
I have searched high and low and cannot find a way to send a disconnect to the iSeries server using RPGLE/CGI. I have a secure application that works just fine. The initial login page will display and all is well. However, I would like to add a “LOGOUT” button to the web pages and have [...]
Answer Question | May 31, 2011 8:43 PM
CGI, RPGLE, SSL, SSL bridging, V5R4
Is it possible to fully audit Oracle Databases without Oracle’s audit tools? At least on 10g and above, many of the configuration files that could be reveiwed and audited for content and permissions no longer exist or are not used. Init.ora, sqlnet.ora are no longer used, and I suspect I will find others as I [...]
Answer Question | May 25, 2011 7:15 PM
Auditing, Oracle 10g, Oracle 10g administration, Oracle Database, Oracle Database 10g, Oracle security
I need to create firewall rules to allow FTP connections from specific clients. I have their network address/subnet mask. How can I add this for all servers from my Sonicwall Pro 3060?
Answer Question | May 25, 2011 5:50 PM
Firewalls, FTP, Network connectivity, Networking, SonicWALL, SonicWALL Pro 3060, Subnet mask
I have a userid (eg:rock) created with a password assigned to it now I want to nullify the password so that if I type in the userid (i.e. rock) the user should login without being prompted for a password
Answer Question | May 23, 2011 7:27 PM
Administrator password, Security, Solaris, Solaris User Accounts
This week, you get your pick of our most recent IT book titles. Check out our latest titles in the IT Bookworm Blog for more details on these books: Scalability Rules Multicore Application Programming Drupal’s Building Blocks Building Applications in the Cloud DTrace To win one of these great resources, answer a question from the [...]
Answer Question | May 25, 2011 5:22 PM
AS/400, Business Intelligence, Channel, CIO, CRM, Database, DataCenter, Development, Exchange, Giveaways, IT answers, IT Books, Linux, Lotus Domino, Microsoft Windows, Mobile, Networking, Oracle, SAP, Security, SQL Server, Storage, Virtualization, VoIP, Windows Server
If I have an ISP connection with a firewall configured to have a vpn tunnel to one of our service providers, what is the security risk in having another vpn tunnel configured to go to another partner where we do business?
Answer Question | June 29, 2011 8:27 PM
Cloud Computing, Firewalls, Juniper, Juniper NetScreen-25, NetScreen, Networking, VPN Netscreen Juniper Firewall
Is the rain keeping your weekend plans from getting off the ground? Well, IT Knowledge Exchange has a chance for you to take advantage of staying indoors. Ask or answer 10 questions* this weekend, and you will earn 100 knowledge points, good for our current contest! Any combination of asking/answering is acceptable. Post the links [...]
Answer Question | May 20, 2011 3:50 PM
AS/400, Business Intelligence, Channel, CIO, CRM, Database, DataCenter, Development, Exchange, Giveaways, IT answers, Linux, Lotus Domino, Microsoft Windows, Mobile, Networking, Oracle, SAP, Security, SQL Server, Storage, Virtualization, VoIP, Windows Server
What role does the SIP proxy server play and what issues would we see if it goes down? Can we run it as a virtual machine and have a backup one in another VM?
Answer Question | May 26, 2011 7:45 PM
Backup Server, Proxy Server Configuration, Proxy servers, SIP, Virtual Machines
Do licenses allow us to create a hot spare sonicwall 3060 firewall licensed up and ready for action if the primary firewall fails?
Answer Question | May 19, 2011 7:21 PM
Firewalls, Licensing, SonicWALL, SonicWALL Pro 3060
I have a Lotus Domino 6.5 environment , clients as well. I have 2 questions , I’ll ask the first one then once I get that answer I’ll ask the next . I have recently upgraded Symantec to BE 2010. The new agent will no longer talk to the Lotus 6.5 databae , this is [...]
Answer Question | May 20, 2011 8:45 PM
Backup Exec 2010, Lotus Domino, Lotus Domino 6.5, Symantec
hi if any one having iso image for SUSE Linux.kindly give me.
Answer Question | May 19, 2011 12:16 PM
ISO, SUSE Linux, VMware
Hello! I am running Windows Server 2008 R2 Enterprise and Forefront TMG 2010 adn SQL-Express as local database After upgrading Forefront TMG 2010 to sp1 reports stopped generates. Reports are empty. First problem was “The report server cannot process the report. The data source connection information has been deleted. (rsInvalidDataSourceReference)” but I`ve solved it by re-writing connection string(I`ve [...]
Answer Question | May 18, 2011 11:48 AM
Forefront TMG, Forefront TMG 2010, SQL Server, Windows Server 2008, Windows Server 2008 R2