• USB port security

    I have a user that needs their USB port to be able to save data in their USB drive. For security purposes the USB drive is not able to save data into any USB drive but they are able to view data on a USB port. That was approved by corp and I need to know how to do this. How do I enable the "save...

    ITgeeks35 pointsBadges:
  • Regarding SFTP

    I am not a AS/400 programmer but overheard my colleagues and suggested them to use SSH. Greatly appreciated if anyone can suggest here... They have a batch job which creates a text file containing the sftp command passing IP address, username, password and the file to be transferred. I suggested...

    bijunator5 pointsBadges:
  • IT

    If company A attacks company B, how should the company A address the issue? What is the possible solution?

    RANARANA5 pointsBadges:
  • What are the costs involved in having a product certified

    I have a product that I want to get listed on the certified product list. How can I do that?

    dzerna5 pointsBadges:
  • Key Loggers and Root kits

    Hi All, It seems my company is affected by key loggers and root kits and malware. Would you people suggest if this can be cleaned and controlled at perimeter level with help of ASA firewalls, IPS things of that sort? Can we tight the security for these kind of issues with ASA firewall at perimeter...

    raviv073110 pointsBadges:
  • Will litigation against Huawei affect me as a buyer?

    I have been working on assessing a few leading network equipment vendors in the likes of Cisco, HP, Juniper, etc., to procure Layer 2 switches. I am currently assessing the capabilities of Huawei and i have been hearing about a litigation raised by Nortel (Avaya) against Huawei on their Layer 2...

    Unified Communications ATE2,240 pointsBadges:
  • Preventing command prompt access except by domain admin

    Can we prevent command prompt access on all servers except for when run by a domain administrator?

    NewnanIT1,110 pointsBadges:
  • Using the free reverse engineering malware tools in REMnux

    Hi Experts, I have seen Keith Sir's(Keith Barker)Video on REMnux. This seems to be powerful. I have somewhat understood the video. Had little queries. Kindly guide/suggest.I Just wanted to understand if this can be implemented on production as VM and scan through the infected windows...

    raviv073110 pointsBadges:
  • Microsoft Virtualization live expert chat: 3/31, 11:00 am EST

    Edwin Yuen, Microsoft Virtualization expert, will be with us March 31st from 11 - 3 EST here on IT Knowledge Exchange to answer your enterprise virtualization questions in a live chat. Join us on the Microsoft Virtualization blog 11:00 am EST on March 31st to ask Edwin your toughest enterprise...

    JennyMack4,280 pointsBadges:
  • Screen saver

    How do I set up a security question for my screen saver?

    katydid405 pointsBadges:
  • Working on getting into the field…

    Hello anyone and everyone! My name is Marty and I am working on getting into the Information Security field so I have a lot of questions. For now though, I will post just this one to start. I am 45 and a Disabled Veteran starting late, obviously, getting into the field, so what are the most...

    MockLife5 pointsBadges:
  • How can I install Windows XP by USB with an ISO?

    I have a Windows XP ISO. I want to install windows by using USB.I have tried to transfer ISO by using this utility "Windows 7 USB DVD Download Tool", but I shows error "The selected file is not a valid ISO file. Please select a valid ISO file and try again".While ISO file is working. I have burnt a...

    Xaphar220 pointsBadges:
  • Implementing a Security Policy Within an Organization

    Hello everyone,My name is Trevor, and I'm a student at UAT, doing some research on different implementation frameworks for establishing a security policy. In particular, I came across the SKiP (Security Knowledge in Practice) framework, and saw some advantages and disadvantages.This framework has 6...

    tlawren35 pointsBadges:
  • Buffer overflow detection technique

    which is the best buffer overflow detection technique?

    Ta5 pointsBadges:
  • Free Chapter – Hardening a SQL Server implementation

    Another free chapter download is available on the IT Bookworm Blog. Written by: Ross Mistry and Hilary Cotter Book: Microsoft SQL Server 2008 Management and Administration. Overview: “If you need to deploy, manage, or secure Microsoft SQL Server 2008, this is the complete, fast-paced, task-based...

    BrentSheets6,925 pointsBadges:
  • NIST

    Hi. I am a Network Security student at UAT and this week we are studying security frameworks. I have chosen to learn about NIST. Has anyone every used NIST and can you share what you did and did not like about it? Thank you very much.

    officialdave5 pointsBadges:
  • HBSS Question

    Does anyone know how to pull the AV logs from hosts McAfee Agent remotely from the ePO Server?

    GasPerez20 pointsBadges:
  • ISO 27001 help?

    Hello, I'm a student at UAT and am attempting to find out what would the best way be to implement ISO 27001 framework from the ground up. Has anyone here set it up from nothing, and what recommendations do you have starting this up?

    GasPerez20 pointsBadges:
  • Access internal web server with domain name

    I was wondering what is the best method for allowing internal computers to access our locally-hosted web server with www.somedomain.com? I believe the internal clients are unable to do so because of how firewalls/NAT works (?). Is there a way I can add an entry in my DNS server? I am using Windows...

    Skepticals0 pointsBadges:
  • How to create a Windows 98 bootable USB using IMA file.

    I want to create a bootable USB using IMA file, having Windows 98 boot files. I have created a bootable CD by using this. I have checked this on SATA DVD Writer Drive. It was working fine. It contains this. http://i.imgur.com/eTz1cWX.jpg OR Provide me a bootable ISO, so I can use it with DOS prompt...

    Xaphar220 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following