• Running more than one anti-spyware tool

    I've recently been talking to some IT security professionals about the absence of a single tool that can fix all of their spyware problems. It seems that to get most of the spyware off of a Windows system you need to run more than one spyware checker, and you need to run them in a certain order....

    RobynLorusso230 pointsBadges:
  • VPN from one house to the other

    Hi I'm trying to get my parents house and hoiday home to connect through a vpn so he can still do his work whenever my mom ain't watching or taking his laptop so he should rest :) And what I want to nkow is is it possible with just two xp or 2k machines? They have DSL at both sides but the routers...

    WikusIT0 pointsBadges:
  • Network Design Development

    How do I create a network design for a large business? The following is the scenario and the requirements, I need so help please. An Ice Cream Factory with 5 stores, citywide and has connectivity to the corporate office in Austin. Each store is responsible for maintaining its inventory locally, but...

    ITgirl840 pointsBadges:
  • who integrated Domino Admin Server Monitoring in CA Unicenter NSM Console?

    We only want one monitor in our IT production environment: CA Unicenter NSM Console. Therfore we want that all irregular events of Domino Administrator Server Monitoring are sent to CA Unicenter NSM Console. Has anybody done this or can give hints or tips? Thanks a lot.

    Fred0 pointsBadges:
  • Firewall MIME content types

    Now and then I recieve complaintes that users can't access web content and it's because my firewall has blocked it based on content types such as the one today, application/vnd.ms.wms-hdr.asfv1 How can I determine if this MIME content is safe and if there are no known hacks so that I can remove the...

    JEAKINS0 pointsBadges:
  • HELP!

    Network Layout We have 26 branch offices connected back to headoffice via VPN. We run a single Windows 2000 domain with DC's at each branch. Branch employees logon to systems using a common username/password due to the change in staff and shift work. Users want to securely store their documents on...

    Scraigc0 pointsBadges:
  • Desktop or Personal Firewalls

    1) How can an application detect that a Desktop or Personal Firewall is blocking a port or binary image? 2) Also, how can application get vendor specific information about the running firewall? Thanks for you help

    PCSouth0 pointsBadges:
  • Moving DNS outside

    We are moving DNS services outside and I would like to learn more about how to set this up. We currently have AD Integrated DNS server, Primary DNS server, and Secondary DNS servers set up in our AD domain. We have 2 Domain Controllers, one on Windows 2003 w/Exchange 2003 w/GC, and one Windows 2000...

    Jerryn35 pointsBadges:
  • Event viewer err Msg.

    Good day, 1.In our organisation, we are using windows2000 smallbusiness server with EXCHANGE , ISA server and DNS configured. but all the client pc's are given static ip address instead of dynamic ip. will this create any problem ? daily i'm receiving many application error logs.particularly 2 type...

    GiriPrasad0 pointsBadges:
  • Wireless Security

    We are running an NT4 network in one building with about 50 users. I have recently installed a LinkSys WAP with a 32-bit WEP encryption key, so when our sales guys come in with their Thinkpads, they don't have to fight for network points. I have programmed the encryption key into their laptops, so...

    Tinners0 pointsBadges:
  • Going back to work after some time at home

    This question is from SearchSecurity.com user: I am 36-years-old. I was downsized five years back from a Fortune 500 company. Since then, I've been home with my two small children. However, now I want to go back to part or full-time work. I used to work in performance testing and enhancements of...

    MiaShopis0 pointsBadges:
  • Packeteer vs. CheckPoint Floodgate for bandwidth management

    I'd like your opinions, please, on the preferability of using the Packeteer solution for bandwidth management over CheckPoint's Floodgate product. Current network uses Internet VPN's over frac T1s to connect 15 remote offices worldwide to all servers and resources at my US HQ. Software is CP VP-1...

    Briteiros0 pointsBadges:
  • How to Obtain security information of Win 2003 server folders

    Does somebody know if there is a way to query the Directory database to obtain a listing that includes security and other settings (shares, permissions, etc) of all folders and subfolders of a machine running Win 2003 Server ? Any help or comment will be appreciated.

    carlosdl69,510 pointsBadges:
  • Encrypting data transmissions on a dedicated phone line.

    We are analyzing all information transfers including FTPs and the need for encrypting data during transit. Some information travels over a dedicated phone line, such as debit card information, and since we are consistently under scrutiny by regulatory compliance, wondered if there were any specific...

    Marcia570 pointsBadges:
  • What’s your experience with Microsoft tech support?

    I'm doing some research on the effectiveness of Microsoft's technical support, possibly for an article on SearchWindowsSecurity.com. Our site readers continually need help troubleshooting Windows security dilemmas. Some seem to find what they need on Microsoft's Web pages, and others don't get...

    RobynLorusso230 pointsBadges:
  • test message

    test message

    Shimooka20 pointsBadges:
  • Question about IT management software-2

    Hello, I am just wondering if anyone knows of some software avialable for IT departments, that say is accessable to users through a company intranet site where a user can go in and log an issue or problem with thier system which goes into a database, then once the issue is resolved the user can go...

    Natethegreat0 pointsBadges:
  • security related

    What is Digital Signature? I need the procedure and algorithm of it. If you have any sample program please send it to me.

    Sharan0 pointsBadges:
  • Items disappeared on network protocols and services tab

    The following question was submitted to SearchWindowsSecurity.com by a user: I'm having a serious problem with Windows NT. I put two PDC Windows NT in the network to try to demote one to BDC, but I forgot to change the IP of the first, so they conflicted. Since this, the items on the tab of network...

    LMullen0 pointsBadges:
  • Excel Help

    What I have now is a simple excel spreadsheet to input numbers and info. What I want to do with it is make it a template and have one cell in the top left corner to add a new number in order each time a new user opens it. For example in the cell would be number 123 and the next time when someone...

    Ctg02315 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following