• Configuring Cisco Wireless Router

    Greetings, I have a Cisco 871 wireless router and am having problems configuring it to act as a Wireless Access Point for my small internal network using Microsoft Small Business Server 2003. I am trying to set up one client access via wireless. Using Cisco’s SDM Express, when trying to change...

    RP@ADF15 pointsBadges:
  • Applying an ACL in Packet Tracer for class

    I'm having a problem figuring out how to configure the following:Allow hosts on the 192.168.30.0/24 network web access to any destination Allow hosts on the 192.168.30.0/24 network ICMP access to any destination. Explicitly deny any other access origination from the network.Now the they say...

    MRLS71815 pointsBadges:
  • ITKE Discussion tool bar

    It's been a few weeks since I had the discussion tool bar. ITKE development can not replicate the problem. Did you experience this problem? How did you resolve it? Thanks Phil 5/7/13 .. added tags that have nothing to do with this task but might get some attention

    philpl1jb49,600 pointsBadges:
  • Blocking user internet access

    Hi, we are currently using a Fortigate 60 Firewall. I need to block user internet access via the firewall. I have been told that this can be done by creating a user group. The users need to be setup with there MAC address and this is what will be used to block the access. My problem is that I'm new...

    Shakeel111125 pointsBadges:
  • Please help me in security

    I have question about public key and private key. If one user sends a message to b, encrypted by public key of b, then how can user b decrypt it using its private key? I mean the public and private key are not different?

    dhaval279235 pointsBadges:
  • What can we do to better protect ourselves from authentication-based attacks?

    According to the 2013 Verizon Data Breach Investigations Report, authentication-based attacks continue to plague enterprises as 80% of all attacks collected by Verizon (and other partners) were authentication-based. Who's to blame for these attacks? Well. Tom Bowers, regional security architect at...

    Michael Tidmarsh28,905 pointsBadges:
  • Security in cloud computing

    I have developed a web site for connecting to cloud and I'm storing my files in the server which I have bought from a cloud provider (actually it is an instance of that cloud). But I want to store the data which is uploaded by the user to be stored in the cloud i.e cloud storage or walrus I have...

    comptechit10 pointsBadges:
  • Differences between firewalls and routers

    What are the differences among firewalls and routers.

    yans112112290 pointsBadges:
  • What’s the one network security tool that you can’t live without?

    With security breaches becoming more frequent, expert Michael Gregg looks at network security tools that no tester should be without. We would like to know....what's the one network security tool that you can't live without?

    Michael Tidmarsh28,905 pointsBadges:
  • Android app game hacking

    Ok I really need to know how this person is able to find out my information while I'm in an android game app in the games lobby. Any help would be greatly appreciated. I'm not the only one that this person has gotten personal info from on this app. Help!

    needtoknow1030 pointsBadges:
  • Please help in hacking?

    I have to do disclouser attack using Java...can I do it? If yes, then please help. How can I do it because I am studing about security and I know what is happening in disclouser attack but I have to practically know it.

    dhaval279235 pointsBadges:
  • Computer misuse

    I was wondering if you could answer this question for me. I was given access to the HPI system (checks finance on vehicles) over 8 years ago through my employer. I thought this service was a free service as we are in the transport industry. I did 3 personal checks on this system (bearing in mind...

    marieg3935 pointsBadges:
  • How to apply group policy to a local security group.

    I want to use Local Group Policy Editor to apply group policy to a specific custom security group created using local users and groups snapin for MMC. Is this possible and if so how? If not, than what is the purpose of being to add local security groups. Custom groups do not appear to show up in...

    Falerin5 pointsBadges:
  • Renewal of SSL certificate on AS/400

    Hi, I have renewed the SSL certificate of my iSeries system. While renewing certificate, I haven't got any option to specify the number of days to renew the certificate. It is getting renewed for 1 year by default. How to increase these number of days for SSL certificate while renewing it. Thanks...

    Ketan19305 pointsBadges:
  • Making sense of the SSL certification process

    The SSL certification process seems unnecessarily convoluted. How do you cut through the red tape when you need to get a new cert/re-certification?What resources are available to make sense of the process?

    Chris Leonard4,300 pointsBadges:
  • Card reader vs text recognition

    Is there a difference between these two? My developer is telling me that I have to buy a card reader in order to take a picture of a business card and manually pull out the information. My question is: 1) Is there a good card reader available for free for iOS and Android developers? and: 2) Do I...

    Notechdeveloper10 pointsBadges:
  • SFTP

    I need to transfer a file using SFTP. It's a PF with a 180 character field. When I try the put command from an iSeries library, the file goes over as binary. If I copy it to the IFS and transfer from there, it goes over as text. But, I cannot have this unencrypted file in the IFS, even temporarily....

    CandyS30 pointsBadges:
  • How to port forward and map IP on SonicWALL TZ 180?

    Currently on my company we are trying to configure our Sonic firewall to map an external IP to internal with a port open. This is for our security cameras setup in which we are trying to view them from another network. Can some one help me please I need to get this done ASAP. Our Sonic firewall is...

    Ricardo5736590 pointsBadges:
  • Count distinct rows on multiple columns

    I want to write a single query that counts each distinct Student ID from the following sample data. Sample Data: ID NAME PLAN DESCR --- ------- ---- ------------------- 101 Michael 010C Cafe- 10.00 Dollars 102 Adam 010C Cafe- 10.00 Dollars 102 Adam 05CC Cafe- 5.00 Dollars 103 Jane 010C Cafe- 10.00...

    Mjackson0 pointsBadges:
  • How does IPSec Passthrough enable packet transfer through a router?

    I have configured a remote access IPSec VPN with UDP encapsulation enabled which passes through a broadband router which in turn has IPSEC Passthrough enabled. The remote access tunnel works fine with the IPSEC Passthrough enabled. However, if the Passthrough option is disabled the tunnel is not...

    NetworkingATE1,545 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following