We need to connect to clients sites securely. They will not let us use remote desktop or log me in. Can we deploy a VPN hardware device on site over the Internet to secure our connection?
Answer Question | July 20, 2011 9:32 PM
Cloud Security, LogMeIn, Remote desktop, Remote Desktop Policy, Security, VPN, VPN hardware, VPN security
Will all of the buzz surrounding the cloud – no doubt amplified by Vivek Kundra’s push to the cloud – are you feeling left out at all? I recently spoke to an operations manager who feels that SMBs are excluded from the discussion because of fewer resources. What information would you like to know about [...]
Answer Question | December 30, 2011 8:23 PM
AS/400, Channel, CIO, Cloud Computing, Cloud Security, CRM, Database, DataCenter, Development, Exchange, Linux, Lotus Domino, Microsoft Windows, Mobile, Networking, Open IT Forum, Oracle, SAP, Security, SQL Server, Storage, Virtualization, VoIP, Windows Server
I get an issue on some users where Certificate error popup pops up, i narrowed down that this only happens to some users using outlook 2010, anyone got any info regarding this or what i need to look at? We run Exchange 2007 Exchange 2007 self signed smtp cert and havent got a PKI in [...]
Answer Question | February 24, 2011 11:55 AM
Exchange 2007, Outlook 2010, SMTP, SSL certificate, SSL Exchange
hi, I am unable to access my exchange account with pop3 and imap4 setting, i have tried various option but fail to do so, i can able to telnet port 110 and 143. i am also having TMG and firewall,is firewall restricting the access if yes can any one plz tell me how to modify [...]
Answer Question | February 23, 2011 6:38 AM
Exchange, Exchange 2010, Forefront TMG, IMAP4, POP3
Is it possible for someone to crack into our VPN between two Windows 2003 servers? Should we invest in Cisco hardware?
Answer Question | February 23, 2011 6:25 PM
Cisco, Cloud Security, Security, VPN, VPN Monitoring, VPN security, Windows Server 2003, Windows Server 2003 security
What is the best way to lock down and secure a Windows 2008 server? We want to block all remote connections and secure passwords and what not.
Answer Question | June 14, 2011 6:21 PM
Cloud Security, Password policies, Remote connection, Security, Windows Server 2008, Windows Server 2008 Administration, Windows Server Security
If we need to pull windows security logs remotely what is the best and easiest way using a domain administrator account?
Answer Question | February 22, 2011 6:18 PM
Cloud Security, Domain Administration, Domain Administrator, Security, Security logs, Windows Security, Windows security management tools
It’s been called “The Bible for Ruby on Rails Application Development.” To get your copy of the book that “strips complexity from the development process,” answer one of five questions and post the link to your answer in the discussion section below. Recovering Oracle 10g Express data SQL 2000 database recovery How to connect Oracle [...]
Answer Question | September 27, 2011 2:34 PM
AS/400, Channel, CIO, CRM, Database, DataCenter, Development, Exchange, Giveaways, Linux, Lotus Domino, Microsoft Windows, Mobile, Networking, Oracle, SAP, Security, SQL Server, Storage, Virtualization, VoIP, Windows Server
Hi, I am an IT manager for a firm which was granted twenty (20) seperate broadband connections with VPN (connecting to a national network) for its use. I am currently looking for a solution that would allow me to use all these connections simultaneouly ( load balancing, fault tolerance etc…). Any pointer would be much [...]
Answer Question | February 22, 2011 1:47 PM
Broadband, Fault tolerance, Internet access, Linux, Load balancers, Networking, Windows
We have many sql server running on seperate boxes, the Network team wants to install antivirus software on all the sql servers. Is that a good idea? Why?
Answer Question | March 2, 2011 4:46 PM
Antivirus, SQL Server, SQL Server 2008, SQL Server security, Windows Server 2003
Recently I have had many alerts appear on my screen saying that an executable in that program has changed and to accept or block. What is the cause of these alerts?
Answer Question | February 20, 2011 3:05 PM
Antispyware, Antispyware software, Malware detection
Hi How can we perform SFTP in batch mode? Is it possible to perform SFTP without using public and private keys? It would be of great help if provided some sample code to refer also. Thanks, Vivek
Answer Question | February 18, 2011 2:31 PM
AS/400, AS/400 SFTP, RPG Batch Mode, SFTP
I am seeing a file named wanancsp.dat located at: C:UsersPublicDocumentswanancsp.dat This is on a Lenovo Thinkpad X201T running Windows 7 Ultimate x64. I have done several general searches and have not come up with this file anywhere. Does anyone know what it is and what it’s used for?
Answer Question | February 20, 2011 11:42 AM
Malware detection, Malware removal, Windows 7, Windows 7 security
We’re a good month and a half into the year, and we wanted to know what’s at the top of your priority list. Does your company want to deploy at least one new application to the cloud or improve holes in your cloud security? Are you learning a new development language to keep up with [...]
Answer Question | September 27, 2011 9:04 PM
AS/400, Channel, CIO, Cloud Security, CRM, Database, DataCenter, Development, Exchange, Linux, Lotus Domino, Microsoft Windows, Mobile, Networking, Open IT Forum, Oracle, SAP, Security, SQL Server, Storage, Virtualization, VoIP, Windows Server
last year i completed my BCA. i’m intrested in CCNA security right now i’m not doing any education so what should i do do Post graduation or do CCNA security. i’m not intrested in programming and i have completed MCSA.
Answer Question | February 16, 2011 9:29 AM
CCNA, CCNA Certification, CCNA Security, MCSA, MCSA Certification, Security certifications
I have Juniper Netscreen 25 and a Cisco 2900 switch with which I’m simply trying to set up a ‘router on a stick’ scenario and I can’t seem get the trunk working. On the Cisco 2900 I’ve done the following: Created 3 vlans: 10, 20 & 30, assigned 5 ports to each vlan, set fa0/20 [...]
Answer Question | February 16, 2011 8:28 AM
Juniper, Juniper Cisco trunk, Juniper Cisco Vlan, Juniper NetScreen-25, VLAN
This week’s free IT book is your complete, authoritative guide to implementing, configuring, and managing AAA with CiscoSecure ACS. For a chance to win AAA Identity Management Security, answer one of the questions listed below and post the link to your answer in the discussion section of this question. Upgrade Exchange 2007 from 2003 (downgrade [...]
Answer Question | February 23, 2011 1:31 PM
AS/400, Channel, CIO, CRM, Database, DataCenter, Development, Exchange, IT Books, Linux, Lotus Domino, Microsoft Windows, Mobile, Networking, Oracle, SAP, Security, SQL Server, Storage, Virtualization, VoIP, Windows Server
User is unable to access outlook when not connected to VPN or to LAN. The Logon credentials continuously pops out. We are using exchange 2010 with outlook 2007
Answer Question | February 28, 2011 10:55 PM
Exchange 2010, Outlook 2007, Outlook Login Credentials, VPN
Former employee has credential to webhosting service, domain registration, and dns – what can we do to get back control of our assets?
Answer Question | February 14, 2011 2:17 PM
DNS registration, Domain Administration, Hacking, Security protocols
i’m looking for a software firewall that filter on a layer 3, filtering by ip/mac/ports only, and ignore completely from files and folders. i tried to config windows 7 firewall and comodo to act like that, but both of them continue to make “decisions” and rules depending on files and applications.
Answer Question | February 11, 2011 5:03 PM
Firewalls, Windows 7, Windows 7 Professional, Windows firewall