Hi I have been working on Encryption/Decryption of data on AS400 v5R4. I have already done the Encryption of data using QC3ENCDT API on COBOOL. Now, I want to use the RSA Public key to encrypt my encryption key. For that I had written a test program but it is throwing one error and I [...]
Answer Question | December 13, 2010 8:27 AM
AS/400, COBOL, Data Encryption, RSA Adaptive Authentication, V5R4
How can we segment a piece of our Windows network so users from the same subnet can not access it but people on that side of the network and a different subnet can. Currently they can communicate freely between each other.
Answer Question | February 9, 2011 5:18 PM
Network Access Policy, Network management, Network security, Subnet, Subnetting, Windows Network Administration, Windows networking
How can I convince a client that taking tapes home in the car is risky, even if they are encrpted?
Answer Question | December 21, 2010 6:55 PM
Backup and restore, Backup encryption, Data Encryption, Open IT Forum, Tape Backups
Is there a central security server for wifi that will only allow corporate clients or employees on the network automatically based on mac address?
Answer Question | February 9, 2011 3:28 PM
MAC address, MAC address authentication, Network security, Network security appliances, Network Security Management, Security hardware, Server Security, Wifi
We need to backup our SonicWALL pro 3060 running OS enhanced software how can we do that and restore to a test box?
Answer Question | December 10, 2010 3:25 PM
Backup and recovery software, Backup and restore, SonicWALL, SonicWALL Pro 3060
I have auto forwarding on Exchange 2003. i.e. email@example.com forwards to firstname.lastname@example.org. This was set up using a contact in active directory,then setting up the user exchange settings. I have four people set up like this and it works most of the time. Except every now and again, if a email is sent from a [...]
Answer Question | December 9, 2010 4:40 PM
Active Directory, Active Directory Settings, Exchange 2003, Exchange Forwarding, Sophos
If the administrator password for an Active Directory box is lost what is the process for recovering it? Can it be done?
Answer Question | December 9, 2010 2:48 PM
Active Directory, Active Directory Administration, Active Directory security, Network security, Password recovery
Is there free encryption software for our corporate laptops? Does it offer remote wiping capabilities?
Answer Question | May 22, 2011 2:45 PM
Encryption, Encryption Software, Network security, Network Security Policies, Remote access, Security, Security management
Can we encrypt or lock a bat file from being read as it has passwords in it?
Answer Question | December 10, 2010 6:33 PM
bat files, Encrypted files, Encryption Software, Network security, Network Security Management, Password policy, Password Protection
Has anyone got any experience of using (3rd party supplied) online backups as a way of creating a DR capability. If they have, what potential risks were faced and mitigated?
Answer Question | February 16, 2011 4:45 PM
Disaster Preparedness/Recovery, Disaster Recovery, Disaster recovery and business continuity, Disaster recovery services, Disaster recovery software, Online backups
A shared mailbox for a team of people, we’re having trouble with user permissions. Some can send mail from the shared folder, other’s cannot. One person is managing user permissions. What is proper setting for all users to have full control of the mailbox?
Answer Question | December 9, 2010 2:14 PM
Mailbox management, Outlook 2007, Outlook error messages, Outlook Errors, Outlook permissions, User Permissions
Hi i am having squid proxy server and with windows 7 home basic clients everything is working perfectly but outlook is unable to connect with gmail please help me thanks in advance
Answer Question | March 3, 2011 12:50 PM
Outlook Errors, Proxy Server Configuration, Proxy servers, Squid, Squid configuration
How can we determine how many sip proxy servers are needed for a new installation? Is there a tool for this?
Answer Question | February 11, 2011 10:06 PM
Proxy Server Configuration, Proxy servers, Server installation, SIP
Is there a monitoring software or appliance that can monitor the status of all systems in our data center from cisco router/firewall to servers and other devices on the network like printers and what not.
Answer Question | December 6, 2010 10:00 PM
Data Center management, Monitoring software, Network Monitor, Network monitoring software, Network Monitoring Tools, Network security
We got into the holiday spirit for this week’s free IT book giveaway. Answer one of the unanswered questions below and win two IT books from our coveted technology library. Another plus? You get to pick which two books you receive. So get to answering, because you have a week to throw your name into [...]
Answer Question | December 7, 2010 3:24 PM
BRMS, Data Center management, DHCP, Domain Administration, Failover, Giveaways, IT Books, Network security, Network Security Management, Proxy servers, SSL, VNC
Can we prevent command prompt access on all servers except for when run by a domain administrator?
Answer Question | December 7, 2010 3:05 PM
command prompt, Command Prompt window, Domain Administration, Domain Administrator, Network security, Network Security Management, Network Security Policies
Hi. I installed TMG firewall on windows 2008 server. I downloaded it on microsoft site. Now it gives me lisence will expired 120 days later. Which modules will stop if i will not buy license. I use RRAS modules on TMG Firewall.
Answer Question | December 7, 2010 11:46 AM
BOOTMGR, Firewalls, RRAS, Windows firewall, Windows Licenses, Windows Server 2008
Has anyone performed a single library restore from a BRMS encrypted tape on one server to another? Here’s my dilemna…I can encrypt fine and restore partition to partition on the same iSeries server. However when I try to restore from a partition on another iSeries server I’m unable to restore. My key on both servers [...]
Answer Question | December 9, 2010 7:02 PM
AS/400, BRMS, Encryption, iSeries
Is there any way to retrieve the user ID from their i5OS user profile using inly their password
Answer Question | December 7, 2010 9:58 PM
i5, iSeries, iSeries User Profiles, Security, User authentication
If we have two offices connected via sonicwall vpn how can we make it so we only need one dhcp server and it can fail over to the other one if necessary?
Answer Question | December 6, 2010 9:41 PM
DHCP server, DHCP Server Configuration, Failover, SonicWALL, SonicWall VPN, VPN, VPN design