I work in a company that has a proxy who can limit the people acces into some sites,my question is…what changes can i do to the proxy server to accept these sites for one or more users?(usual changes into one basic proxy server)
Answer Question | November 18, 2010 1:30 PM
IT Compliance, Proxy Server Configuration, Proxy servers, Server configuration
How do I know about phishing / harmful mail without open it? I know there r no of 3rd party SW, (like mail sniffer etc….) but I ask for is there any in-built tool / mechanism…. I am using Firefox and OS is LinuX
Answer Question | November 30, 2010 12:08 PM
Linux OS, Phishing, Windows Server 2008
Is it possible to restore file from an ntbackup operation to another server and if so is this a security risk?
Answer Question | November 17, 2010 3:48 PM
Backup and restore, NTBackup, Restore files, Security management, Security protocols, Server Security
Could anyone share or provide input on a comprehensive distributed software management policy and standards that prohibit non-developer access to source code and prohibit developers from creating executable code and placing it in migration folders (which then can be moved to test and production)?
Answer Question | November 17, 2010 12:40 PM
Compliance checklist, IT Compliance - Policies, Security management, Software Management
What is the suitable protection level for an internet connected desktop nowadays? Is it antivirus, antispyware and antispam? Or is it more/less?
Answer Question | February 16, 2011 9:46 PM
antispam, Antispyware, Antispyware software, Antivirus, Open IT Forum, Security, Security management, Security software
Can we record any other information in the security log about a failed log in attempt on a Windows XP SP3 desktop? And if so what other information and how can we get at it?
Answer Question | November 16, 2010 6:41 PM
Security log, Windows Login, Windows XP, Windows XP Security, Windows XP SP3
This week’s free IT book is your complete guide to planning, configuring, managing and troubleshooting NX-OS in enterprise environments: NX-OS and Cisco Nexus Switching. For your copy of this great resource for Next-Generation Data Center Architectures, simply answer one of five questions below and provide a link to your answer in the discussion area of [...]
Answer Question | November 15, 2010 4:15 PM
Cisco Routers, Giveaways, IT Books, ITKE, ITKE Contests, Linux firewalls, MySQL Database, SonicWALL, Symantec Backup Exec 12
Hi, for SOX auditing I need to provide Information Security with a daily list of failed login attempts (any server type) and actual logins for a list of sensitive accounts. Straightforward stuff on other platforms but I can’t see how it can be done on i5/OS. I have seen a few references to doing this via [...]
Answer Question | November 15, 2010 3:37 PM
AS/400 SOX, SOX, SOX checklist, SOX compliance
Hello I would be grateful if you could advise me on a security issue I have on my network security. I have a web application on linux with my data stored on a mysql database on the same server (actually it is a sugarcrm) The sugarcrm which contains information about my clients is used by [...]
Answer Question | November 15, 2010 1:34 PM
Firewalls, IDPS, IDS, Linux applications, MySQL Database, Network security
I want to lock my folders. My system does not allow me to check the box “Make this Folder Private” Can you help me??
Answer Question | November 16, 2010 11:22 AM
Folder Lock, Folder security, Security, Windows XP, Windows XP Security
[strong]We are into firewall services, We had our own firewall Hardware & Services. Our Firewall is new in the market & IDS & IPS feture is not available in the firewall. I would like to know from were to get IDS & IPS Signature & certificate so that our firewall will be complete firewall.[/strong]
Answer Question | November 16, 2010 11:09 AM
Firewalls, IDS, IPS, Linux, Linux firewalls
Hi, My team and I are stuck. A 3rd party needs access to certain information on our Lotus Notes database about clients status and we are unsure on how to go about this without jeapodising security and firewalls. We’ve thought of a web based application for the 3rd party however how will we send them updated limited [...]
Answer Question | December 3, 2010 10:04 AM
Database security, Lotus Notes, Lotus Notes 6.5, Lotus Notes Database, Web-based access
what brand is comparable to this exact model or hopefully much better
Answer Question | November 12, 2010 6:45 PM
Access Points, SonicWALL, WAP, Wireless Access Points, Wireless Network
We have a tape rotation system that uses 10 tapes and so we have two weeks worth of backups. A few months ago, we started getting this media mount failed error for just one tape (Wednesday 2 tape). We tried replacing that tape with a brand new one and still get this error each time [...]
Answer Question | November 12, 2010 5:36 PM
Backup and Recovery, SBS 2003, Small Business Server, Small Business Server 2003, Symantec Backup Exec, Symantec Backup Exec 12
Hi, I’m using a script file in an AS400′s IFS to send a file to a Unix server. lchdir /SFTP/RMDEDTRC cd /var/opt/apps/reporting/prod/dat/in/dvcs put RMDDWKP rename RMDDWKP RMDDKEP.TXT chmod 0766 RMDDKEP.TXT quit RMDDWKP is the AS400 file. I want to send it, then rename it. It can’t find RMDDWKP. Why not? What is the correct code? [...]
Answer Question | November 16, 2010 7:30 PM
AS/400, AS/400 scripts, SFTP, Unix
I have an Cisco ASA with one external IP address, and 2 VPN Peers. Now i need to add a web server to the mix. Please tell me how can i accomplish this bearing in mind my existing setup? Thanks,
Answer Question | November 12, 2010 3:39 PM
Cisco ASA, Cisco ASA 5510, DMZ, DMZ Switch, Web servers
Would like to configure ISA 2006 which i installed on Server 2003 .. so that it can acts as an firewall and control internet surfing ?
Answer Question | November 11, 2010 2:04 PM
Configuring ISA 2006, Firewalls, ISA 2006, Windows Server 2003
Why does my ABG antivirus conflict with Yahoo and what should I do?
Answer Question | November 13, 2010 12:14 PM
Antivirus, AVG, AVG AntiVirus Free Edition, Software conflicts, Yahoo
Hi, We have an ND_50A firewall working well in our current environment. Now we plan to add more web application that will be accessed via internet. The application server will be connected to the DMZ port. However, before doing so, we need to know whether ND_50A can afford that in terms of performance, we tried to find the current performance level of ND_50A but in [...]
Answer Question | November 21, 2010 8:47 AM
Application Server, DMZ, Firewalls, Security, Web application
how to run the windows installer in safe mode? how to delete the autorun.inf file?
Answer Question | November 16, 2010 3:19 PM
AutoRun, AutoRun.inf Trojan, Windows installation, Windows XP, Windows XP installation