• Is it necessary to be connected to sniff traffic over a wired network?

    Is it necessary to be connected to sniff traffic over a wired network?

    Rahul Shrivastava330 pointsBadges:
  • Can’t open PDFs from certain websites

    I am long-winded, so please bare with me! We are having trouble opening pdfs on certain websites. Currently PDPworks as well as one of our vendors who uses twelvehorses.com as a pdf server. We are unable to open a pdf from pdpworks at all and are hit and miss with opening pdfs from...

    erin0201215 pointsBadges:
  • .eml & W32.chir Virus Attack

    How can I remove these viruses from my Network? From Messenger Service; A message displayed to my all workstations including servers that "My God! Someone killed a chines hacker-2 Monitor.."

    IT Administrator20 pointsBadges:
  • Configure ISA 2006 installed on Windows Server 2003

    Would like to configure ISA 2006 which I installed on Server 2003, so that it can acts as an firewall and control internet surfing?

    Canafishdrown15 pointsBadges:
  • File deletion on the network

    I would like to set something up on our network in which if someone deletes a file or documents then the file or document is sent to a hidden folder on the network not just deleted. I would even like it to be put into the recycle bin but as it is people have deleted stuf off of my sever and it is...

    Sterling0125 pointsBadges:
  • Is the use of public clouds a good strategy for our company?

    Given that the company currently: Has no hardware or software infrastructure Intends to use cloud based SaaS for its major business applications Use MS Office Professional and a few other misc software tools as its only PC/Notebook installed software. Would you concure that maximizing the use of...

    IMFSystems5 pointsBadges:
  • Who is authorized to give ISO compliance?

    I have a set of test cases for testing various applications and their integration in a Telco. Now I want to have ISO compliance for these Test Case. Who is authorized to give ISO compliance?

    SatyaDas5 pointsBadges:
  • What new features would you like to see on ITKnowledgeExchange.com?

    Members We are always looking for ways to make finding answers and communicating with peers easier on this site. With that said I would love to hear from you on what features you think would make this site better. Some ideas could be to promote users Knowledge points more, allow more senior users...

    ITKE346,080 pointsBadges:
  • Intemittent ping timout

    We are getting intermittent ping timeouts (Request Timed Out / Destination host unreacheable) from most of the client workstations that are connecting to an exchange server 5.5 running on W2K server. There are about sixty users on the LAN and 20 others that are coming through the VPN link via a...

    Dechamp0 pointsBadges:
  • Routing & Remote Access – VPN

    Hello all, I set up a VPN here at the office about 6-12 months ago and everything was working just fine. The other day some wierd stuff happened, It looks to me like a hacker was involved. The firewall had been killed (DOS attack) and some wierd event log enties were found. But anyway we got...

    Adambeazley0 pointsBadges:
  • Defrag 725 GB ona Windows 2000 Server: Pros and Cons

    Good morning! I hae had some performance issues on a Win 2K files server and have been given a recommendation to defrag the system. I am reluctant to do so for two reasons: 1. We do not have an alternate server to place these files while defragging 2. The 2K server is configured as a dynamic drive....

    Melvin0 pointsBadges:
  • Long Path Error While Copying/Moving Data

    Hello Frnds, I am very new in this site. I have one problem while I am cpoying/moving the data from the server to the local machine or in the Local machine it self. The problem is that while copying/moving data sometimes is doesn't work due to long path name. Means that if path length is greater...

    Prash7860 pointsBadges:
  • Can we configure IPs in layer 2 switch?

    Is it possible to configure IPs in a layer 2 switch?

    kailash1235 pointsBadges:
  • Getting my password

    How can I hack my password?

    jay18685 pointsBadges:
  • Long distance monitoring SIP servers and proxies

    We have a data center hosting our sip servers and proxies. The location is far from our main office. How can we monitor the servers and the lines?

    TeachMeIT975 pointsBadges:
  • Didn’t enter correct password

    Did not enter correct password logging. Can someone help me retrieve it?

    magoffin5 pointsBadges:
  • Is someone hacking into my laptop?

    Whilst on Skype to different family members, the camera zooms around the room and I have been told keeps settling on my chest area. Am I being spied on?

    paulinebridle5 pointsBadges:
  • What are the 2FA best practices when configuring an IPSec site to site VPN?

    This is just a general inquiry to see if anyone can offer insight into what would be Two Factor or Multi-factor best practices when configuring an IPSec site to site VPN between two company firewalls?

    JRP1235 pointsBadges:
  • How to become a software engineer and information security expert

    I'm a commerce student that wants to become a software engineer and also an information security expert. Where should I start going about this process?

    DEVILG5 pointsBadges:
  • Best practice, tools to implement Two Factor Authentication

    What are the best implementation and tools to implement Two factor authentication

    Choukran5 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following