• Is security the greatest problem with BYOD?

    While most of the discussion of Bring Your Own Device (BYOD) policy centers around security risks that come with giving the employees’ personal devices access to critical data and systems.One aspect of the issue that is not often raised is the potential for lowered productivity as users spend...

    Chris Leonard4,240 pointsBadges:
  • Cisco Router

    The router 192.168.1.1 comes up with 192.168.1.1:1025. Does any one know how to resolve this issue?

    jmar45 pointsBadges:
  • EtherChannel protocol

    What protocol does EtherChannel uses to communicate between switches, routers and servers?

    Modu5 pointsBadges:
  • EtherChannel: Port to select frame

    If I have 5 link between 2 Switch and I use EtherChannel, which port is select to send the frame? Or we have & or 6 link?

    a3moonii35 pointsBadges:
  • Microsoft Outlook permissions issue

    I want 2 email accounts should be checked by one users. so user1@mycompany.com and info@mycompany.com should be checked by user1. user1 has an account on Active directory but info doesn't have. I have created user1 mailbox and defined it on Microsoft Outlook. He can receive and send email without...

    Nnmmss5 pointsBadges:
  • FTP from IFS of an AS/400

    Hi, I need to FTP from IFS of an AS/400 to a remote server using encrypted/secure transfer. Destination server may not be necessarily an AS/400. I am able to transfer the reports simply, but it has to be encrypted/secure.

    DeepikaR115 pointsBadges:
  • Application and database monitoring tool

    Which monitoring tool is the best tool for application and database monitoring?

    Kulkarni33225 pointsBadges:
  • Static and dynamic IP addresses on one NIC

    I am working on highly specialized test equipment in a university lab. I am communicating to the equipment via TCP/IP on a static 192.168.0.XXX subnet. My laptop and various pieces of equipment connect trough a switch. Also, I can connect to the university internet access (no wireless available in...

    RantEng5 pointsBadges:
  • Deleted user profiles in AS/400

    Hi Is there any way we can know about deleted user profiles in AS/400? We have an audit process wherein the auditor have asked for a list of all the users deleted. Can any one suggest where can I get such a list? pgsdeb

    Pgsdeb20 pointsBadges:
  • Save log view in Event Viewer

    Howdy folks, If I create a new log view in event viewer and filter the results, is there any way to save this view? Every time I close event viewer I have to re-create it. Probably just MS by design.... Is there any way to script it?

    TheVyrys0 pointsBadges:
  • Domain Controller: User authentication

    We have a DC at each site. The problem I am having is I have a PC at site B authenticating to my DC at site A. Why is this happening?

    Dukeminus5 pointsBadges:
  • Information on IT Auditing

    Where can I get the information on IT auditing from this site? Thank You.

    ss38135 pointsBadges:
  • Internal auditing of IT department

    Our organization would like to do an internal audit of our IT department but don't know what we're looking for. Is there a standard checklist of things we should be looking at, like for Financial Audits?

    LoJo20035 pointsBadges:
  • Modify configuration for port security

    Dear All, Presently we have configured port security as below switchport mode access switchport port-security switchport port-security violation restrict switchport port-security mac-address sticky switchport port-security mac-address sticky 000a Now we need to modify the above configuration to...

    Vptechie70 pointsBadges:
  • Have the NSA revelations caused your company to rethink its policies?

    The recent revelation that the NSA collects massive amounts of user data from various technology companies has caused many IT pros to re-evaluate their user policies and data privacy tactics.  Lessons learned from the NSA incursions include changing policies to make their systems and data less...

    Chris Leonard4,240 pointsBadges:
  • What’s the best way to deliver results for enterprise customers?

    In a Q&A keynote Tuesday at the 2013 Gartner Security and Risk Management Summit, Symantec CEO Steve Bennett noted that that no single vendor can offer an all-encompassing mobile security product portfolio. Instead, IT security vendors should cooperate to build a better ecosystem than attackers...

    Chris Leonard4,240 pointsBadges:
  • What type of leadership would be most successful against the threat of cyber-attacks?

    "We don't look out very well to the future…Without accountable leaders, I don't think we'll make much progress." This was one of the powerful messages from Ret. U.S. Navy Admiral Michael G. Mullen, the former chairman of the Joint Chiefs of Staff, who stressed the importance of leadership and...

    Michael Tidmarsh25,225 pointsBadges:
  • Master thesis subject – an idea?

    Hi all, I am in the last year of my master program in Information Security and I have to find a subject for my master thesis with focus on Information Security. Anyone any idea? Thank you very much,

    Pupincurist25 pointsBadges:
  • Exposure on the Internet

    How can I remove myself from being found on the Internet? I have followed all procedures but my name can still be queried.

    weglowde40 pointsBadges:
  • ISA Server 2004 user bandwidth

    How can I manage bandwidth on user basis or machine basis. I want to limit user a to download not more than 50 MB per day and user b 10 mb per day. Also I want to impose connectivity restriction i.e. 10Kbps per user out of 1 Mbps of my bandwidth.

    Maqusman20 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following