• isearch toolbar

    Has anyone heard of a malware product called isearch toolbar? If so, do you know how to get rid of it?

    Duckie5220 pointsBadges:
  • Safe user sandbox?

    *This question is from a SearchWindowsSecurity.com reader: I'm in a position to redesign our IT systems (network, servers, PCs, software, etc.) this summer, and I am undecided on which path to take. I'd like to disconnect our systems from the Internet so that we don't have to deal with all of the...

    LMullen0 pointsBadges:
  • ISA Server/Surf Control Web Filter For External Users

    Hi All, my current setup is as follows: X1 DC with ISA2000/Surf Control Web Filter installed (will be changing these services to a dedicated server shortly!). Currently, internal users are forced through the ISA webcache/Surf Control Web Filter server using Group Policy and all works fine. For...

    Marko20020 pointsBadges:
  • Cisco PIX VPN Bridging – Am I missing something??

    Hi, I'm tryin to set up a VPN between two internal sites on the same subnet. I have 2 PIX 506E's linked together (physically) in my test lab (on outside interfaces). All the configuration examples I've seen of setting up a VPN is between 2 different logical networks. However, I want them to act as...

    Rgoulding0 pointsBadges:
  • RPC over HTTP problem and Exchange, RPC ping error 12175

    Hi all, I'm having a problem with a small amount of the clients that use RPC over http for Exchange 2003. Before I carry on, I have all the correct configuration (XP SP2, Exchange 2003 SP1, outlook 2003, etc..), and I know it works becuase most clients do work. I am now reduced to using RPC ping to...

    Rgoulding0 pointsBadges:
  • PIX – Allow UDP replies in.

    Hi All, The president of my company has started to use skype (www.skype.com). There is a function in the program to do file transfers. When we try that the program show that it has to relay the transfer and when it does that it limits the bandwith to 0.5kB/second. I've pasted the documentation that...

    Dansken0 pointsBadges:
  • Password Policy effects on Admins

    In Win NT and Win 2K, if password complexity was enforced, and admin could still by-pass that by setting a simpler password via User Manager or ADUC. However, in Windows Server 2003, it appears that even an admin must comply to the policy when setting a new password. Is this in fact true? If so, is...

    Joseph620 pointsBadges:
  • Exchange 2000 issues

    I seem to have 2 issues. Both are on the same setup. Windows 2000 Server running Exchange 2000. Both have all the latest patches and SP's. 1) Mail will flow inbound just fine. Some mail will flow outbound just fine. Certian addy's just have in the SMTP queue ( AOL,Yahoo, Bellsouth ). Other mail...

    Aclark950 pointsBadges:
  • Internet lockout

    Hiya guys, Same question for 2 OS's - Win 95 and Win 2000 I work as a network manager for a school and wanna lock the kids out from changing the internet options in internet explorer! What i want to do, is let them use the internet (Till they take the P***, then i'll take it back) but when they...

    Carl0s810 pointsBadges:
  • Windows 2000 Server security on network shares

    This evening I will be transferring all of our employee user folders to a different server. This contains the following folders: My Documents, Application Data, and Desktop. Group policy is configured to redirect all of these settings to a server rather than the client's local hard disk. Now for...

    Waynebk0 pointsBadges:
  • Unexpected Win2K Server shutdown.

    Over a four minute, 36 second period beginning around 10:20 PM EST, seven servers, all in one rack, all on the same UPS suffered unexpected shutdowns. All servers are time synchronized and examining the Event Viewer only two shutdown at exactly the same time. Two other racks of servers, each on...

    Michael4320 pointsBadges:
  • ZENWorks Desktop Management and Win98 Restart Hang

    I'm having a problem with upgrading an HP VL-7 (Pentium II/233) and Gateway E-4200 (PIII/450) PCs from Win95 to Win98 SE. I turn on Novell Workstation Management and Remote Control (ZENWorks) in Client 3.40 during that install. We use workstation management options so the WM95.exe (Workstation...

    Beelymagee0 pointsBadges:

    I am trying to define a snort rule that will detect the word "spam" in the subject field of an email. So far I have tried alert tcp any any -> any 25 (content:"Spam" nocase; msg:"Email traffic logged!";) But this is not filtering out only the emails that I want. ANy help would be much...

    Bred850 pointsBadges:
  • How to BVlock port on Pix 506 Firewall

    I am new to networking. I want to know how can i block the port in the network through firewall & proxy. Anybody can provide me some documenation on PIX Firewall & its basics.Pl. send some inportant site address to expand my knowledge. Bye Pramod

    Psharma11760 pointsBadges:
  • Biometrics

    I am looking for a method of utilizing a fingerprint reader on the iSeries. From an RPG program, I would like to prompt for input from a fingerprint reader and accept data from the reader. I do not want to utilize any 3rd party vendor software to do this.

    Rharding0 pointsBadges:
  • Use of TFTP

    Why is the use of TFTP discouraged on the network from a security perspective?

    AaronD0 pointsBadges:
  • Yearly Data owner review listing

    Hi, We are currently on SAP 4.6C With SOX and other security settings we need to min. yearly prepare a user list per data owner, so that the data owner can review and sign-of on this. The data owner is determined per role. Now my question is, does anyone know a way of assigning a data owner to a...

    Sigrconi0 pointsBadges:
  • Regarding Previous Sign-on Date field as a result of DSPUSRPRF cmd.

    Is this field only updated when a person signs on via 5250 session? We have a client server environment where the programmers develop in delphi. Most all of our production user profiles are set to initial pgm *none and initial menu *signoff. But, in a fair amount of the user profiles I'm seeing...

    Davefett0 pointsBadges:
  • Link Encryptor vs. SSL/TLS

    Okay, these are very basic questions. First, how does a link encryptor work? Second, if a link encryptor is in place, is there a need for SSL/TLS?

    Bwalthall0 pointsBadges:
  • Help required in configuring ISA server 2000 firewall

    Hi all, I have some queries related to Microsoft ISA server 2000. First of all I want to provide some info about my network. In my network most of the systems are using different flavor of MS windows and one computer (call it server1) is providing internet access to all the other computers...

    Iazher0 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.