• Deleted Emails

    Hello A user on my network deleted all his emails in the inbox and also emptied the deleted items in MS Outlook 2003. We are using POP3 email accounts. I have a backup of all the emails except for the day this happened. Is there any way to restore the emails?

    Aftabn0 pointsBadges:
  • module moves on i5

    I wanted to check on a possible solution for a problem we have run into with our module moves. Cause of audit requirements we can't have pgmr's in the productions systems. So as a work around I have them creating their code in sourclib on the test partition then I have operations copying it into a...

    Mstallings0 pointsBadges:
  • Blocking Tunneling Applications

    Hi; Any suggestions on how I can block hopster(and other similar socks based tunneling applications)from tunnelling out and bypassing the firewall? When hopster contacts its servers it uses different set of IPs, not a single domain, so its kind of hard to block it based on IPs Thank You

    Maryam82100 pointsBadges:
  • Detection of ActiveX & other Mobile code

    Hi ! I am trying to extend the functionality of a squid-based proxy to filter out ActiveX, JavaScripts and mobile code in general, from the web pages users will download. I am trying to make it an "intelligent" filter, in the sense of not just plainly removing the <OBJECT> tags from the page,...

    Hedgehog0 pointsBadges:
  • Routing through other network

    hi,there is a problem.it was heavy rains since few days becouse of which our connection to our ISP has been broken.there is another network in the neighbourhood which is connected to the same ISP. how can we route our traffic through there link,what hardware n software configuration changes we need...

    Redrose0 pointsBadges:
  • Help calling an RFC from my Java application to an SAP table

    Hi there, I know next to nothing about SAP and RFC, but let me explain my requirement. I have one Java-based application system, which is developed based on Java/JSP, snd SAP is implemented in our oraganization. In another system, SAP RFC service and type manager is running. I want to call an SAP...

    SAPseeker0 pointsBadges:
  • Windows client XP firewall activation or not in a corporate lan ?

    Should we activate the XP firewall in a firewall protected LAN or does it cause complications for services and apps & users. I have been advised not to use it as it causes problems and confusion for LAN based users and complications and conflicts with the external firewalls. thanks.

    Stanslad0 pointsBadges:
  • Uploading data using BAPIs

    I'd like to know the procedure for uploading data using BAPIs. Generally we would do that using BDC methods or LSMW -- how can we do the same using BAPIs?

    SAPseeker0 pointsBadges:
  • Are FIPS and other NIST InfoSec standards and criteria accepted commercially?

    I know that information security decision makers and policy makers within the Federal government rely heavily on standards such as FIPS certification from the National Institute of Standards and Technology (NIST). How much weight is there placed on a product or service that has met certification...

    NAT19710 pointsBadges:
  • aaa authorization ?

    Which of the following authorization commands are valid? (we have to choose 2 correct) A. aaa authentication exec home radius B. aaa accounting exec home radius C. aaa authorization default none D. aaa authorization exec home radius E. aaa authorization network default enable F. aaa authorization...

    EngineerIT0 pointsBadges:
  • Cisco 1811/1812 vs Netscreen 5GTE

    Hello all, Did any of you have/had any experience with both Cisco 1811/1812 and Netscreen 5GT(E)? Which one is better/faster/has more features/more user friendly according to you? What I need is a router/firewall/IPS appliance that will allow me to set up some DMZ and two LANs and that will serve...

    Maciek0 pointsBadges:
  • SQL Server worst practices

    Hello, My name is Nick Bellistri and I am the assistant site editor for SearchSQLServer.com. Jeremy Kadlec, a performance and tuning expert at SearchSQLServer.com, recently wrote up what he considers some of the worst SQL Server practices and offered recommended fixes. You can see the list here:...

    Nbellistri0 pointsBadges:
  • SSO for 4.6C

    Looking for info about Single Sign-On options in a 4.6C environment. All I can find to date at MarketPlace/OSS deals mostly with Netweaver. Any info on SSO overview, capabilities, installation in a 4.6C (non-Netweaver) environment would be helpful. Thanks . . . .

    Sysop0 pointsBadges:
  • Secure File Transfer for Mainframe systems

    I would like to transfer files from Unix machine to Mainframe system (using Unix machine as client). The transfer process need to be secure (ie. data sent thro network should be encrypted using 128-bit encryption algorithm). I came to understand that SFTP server is not available for Mainframe...

    Tsdnesh0 pointsBadges:
  • USB connected fingerprint scanners

    While discussing testing biometrics (fingerprint scanners) for single factor authentication, one of the sales reps indicated his device encrypted the fingerprint (scan) prior to sending to the computer via a usb connection. I was wondering if this sounds true as the scanner would need additional...

    MarkN500 pointsBadges:
  • wireless access points DHCP and drive mapping

    Hello all, I recently installed wireless access points in my organization. They are configured to set automatically via DHCP on a 2000 server machine. It seems to work fine. But when I map a drive on client laptops running XP Pro and set it to reconnect at logon the drive either mysteriously...

    Zzegri0 pointsBadges:
  • Upgrade to SQL Server 2005 sooner or later?

    Hello, I'm the editor of SearchSQLServer.com and I am hoping to get your opinons on a timely topic. Prior to Microsoft announcing its November 7 release date for SQL Server 2005, we had run a poll asking site members: How have the delays with SQL Server 2005 affected your organization's plans? 58%...

    RobynLorusso230 pointsBadges:
  • Files and directory access loging

    one of my clients is asking about a daily report contains all files and directories accessed every day and who is accessing it (time and mode:delete ,read ,write.) on a spicific share. so i tried using a script to filter out all events regarding files access but that looks time consuming method ....

    Zbanoon0 pointsBadges:
  • New Snort certification from Sourcefire — Beneficial or not?

    Hi folks, I'm the editor of SearchSecurity.com, and I'm writing an article on Sourcefire's new certification program. They're offering certs on both Snort and Sourcefire products. I'm curious to know how these will be received by the user community -- particularly the Snort cert. I know there's a...

    SearchSecurityEditor0 pointsBadges:
  • INFORMATION SECURITY AWARENESS AND TRAINING

    I am looking for war stories! Working with a client to develop a Awareness and Training Strategy and one of my tasks is to sell the need. If anyone has any war stories that can talk to how the lack of awareness and training caused problems from a security I would appreciate these stories. Also, if...

    Sailingon0 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following