• HBSS Question

    Does anyone know how to pull the AV logs from hosts McAfee Agent remotely from the ePO Server?

    GasPerez20 pointsBadges:
  • ISO 27001 help?

    Hello, I'm a student at UAT and am attempting to find out what would the best way be to implement ISO 27001 framework from the ground up. Has anyone here set it up from nothing, and what recommendations do you have starting this up?

    GasPerez20 pointsBadges:
  • Access internal web server with domain name

    I was wondering what is the best method for allowing internal computers to access our locally-hosted web server with www.somedomain.com? I believe the internal clients are unable to do so because of how firewalls/NAT works (?). Is there a way I can add an entry in my DNS server? I am using Windows...

    Skepticals0 pointsBadges:
  • How to create a Windows 98 bootable USB using IMA file.

    I want to create a bootable USB using IMA file, having Windows 98 boot files. I have created a bootable CD by using this. I have checked this on SATA DVD Writer Drive. It was working fine. It contains this. http://i.imgur.com/eTz1cWX.jpg OR Provide me a bootable ISO, so I can use it with DOS prompt...

    Xaphar220 pointsBadges:
  • Adding a password to a SQL Server 2005 database

    We are moving our Microsoft Access database to SQL Server 2005, and the Access database has password protection. How can you add a password to a database in SQL Server 2005?

    SQL Server Ask the Experts2,585 pointsBadges:
  • SQL Server restore job fails

    I've created a Restore Job under SQL Server Agent. Job owner is sa, Run as User dbo. There are no users connected to the database or processes running. The job fails with: Msg 3101, Sev 16: Exclusive access could not be obtained because the database is in use. [SQLSTATE 42000] Msg 3013, Sev...

    TuftsDBA0 pointsBadges:
  • Front-End Reporting Tools for Secure Web Service Application with MS-SQL server-2

    Hi... We are a Cdn Govt agency involved in Satellite Operations with a commercial partner based across the country. We will need to build/buy a small secure web service application for reporting purposes that will require minimal IT expertise to build or maintain, and will deliver maximum...

    Mmosystem0 pointsBadges:
  • SQL Server 2000/2005 – Creating Unique Constraints allowing multiple NULLs

    Hi there! I'm having a problem maintaining data integrity on a database table in MS SQL-Server 2000. To ensure maintaining the integrity I need to implement a Unique Constraint on one of my coloumns. The problem however is, that this coloumn also has to allow multiple NULL-values - but for every...

    LeChuck0 pointsBadges:
  • radiation dose conversions

    Hi how do you convert 10micro gray metres squared to millgray or decigray centimetres squared?

    conor5 pointsBadges:
  • How can I bind IP address to MAC address of PC

    I have ISA Server 2004, only selected users are allowed to access internet. Here my requirement is to allow selected LAN users to access internet only from their machine. I have tried allowing them through IP based. IP based: a user can ask or guess someone IP and put in his machine and get access...

    pdsathishkumar3,790 pointsBadges:
  • NVR login to failed through internet

    I able to access my NVR in local network. But I'm not able to login through internet using public IP. I publishing the NVR through ISA server. I'm able to see the login page, but after enter user name and password, "Main connect failed" message comes up. Do you have suggestion, please share with me.

    pdsathishkumar3,790 pointsBadges:
  • Is it possible I was hacked through my VPN?

    I have a hacker problem. I am using a VPN that specifies it is USA on an iPAD, and is Apple approved. When I log into my email it always gives a California or Texas IP address, with one exception: Once a week it says I have logged in from Dubai. I was actually logged in when this happened and the...

    ITKE342,450 pointsBadges:
  • Is SDN more than OpenFlow? What about overlay networking?

    As techniques like OpenFlow gain a foothold in the physical and virtual infrastructure layers and the multi-tenancy models mature, should OpenFlow conversations be taking place between the provider-controlled layer and the application-controlled layer? How do we - vendors, users, and industry pros...

    CohesiveFT5 pointsBadges:
  • Deleted Object not Found in Audit Log

    I found a Program object present in the system when I did a DSPOBJD for a library last week. But today, when checked the object is not present in the system. I checked the AUDIT Logs (DSPAUDJRNE, DSPJRN, CPYAUDJRNE) with DO, MO etc. But this object has not been registered anywhere in the Audit logs...

    AdminAS40015 pointsBadges:
  • How to make all branches visible to others

    I need a help please. I have fortigate 80c connected to 16 branches through IPsec VPN and all is fine. What I need is to make all branches see each others. I have a trend-net device in each branch.

    ITDeptsd5 pointsBadges:
  • DosCreateMutexSem privilege escalation

    I am looking for an explanation of how a privilege escalation hack would be able to be inserted with a call to doscreatemutexsem function from a windows service that is running under the local system account.  I was unable to find anything on Google and not being a security expert I just don't see...

    CarlCioffi345 pointsBadges:
  • Receiving error message connecting to SQL Server 2008 R2

    I'm trying to connect to SQL Server 2008 R2 using Windows authentication. However, I can't because I keep getting this error:Login failed for user 'AVATOPIA\ian'. Reason: Token-based server access validation failed with an infrastructure error. Check for previous errors. [CLIENT: ]Now, I can log in...

    ITKE342,450 pointsBadges:
  • Scanning Active Directory for weak passwords

    Is it possible to scan our active directory and see if people have weak passwords? We have upped the password policy but what about for users that already have passwords and are not scheduled to changed them yet?

    Troubleshooter24755 pointsBadges:
  • Controlling VPN access

    Here's my scenario. I fall under guidelines of HIPAA. I have mobile users using laptops and tablets loaded with Cisco VPN CLient connecting to my Cisco 2811 ISR which functions as my router/firewall/VPN. I am using Micorosoft AD in my domain. To authenticate users to the domain. Is there an easy...

    Gforsythe75 pointsBadges:
  • Cache-based side channel attacks

    Please help me find a new secure mechanism against cache based side channel attacks in the cloud. I found that ieee published a method for security against AES, RSA, BTB attacks to retrieve the secret key. It is architect based method. Can I do any modification to this work after implementing this...

    mvidya199020 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following