Hello, I send FTP over SSL to ten other servers from iSeries. I have loaded all certificates & trusted and it’s working fine. But my question is, How would iSeries system identifies a particular certificate to verify when we do FTP to any one server of ten ? Thanks Sim
Answer Question | November 5, 2010 4:13 AM
AS/400, FTP, iSeries, iSeries security, Security, SSL
Hello I have several sites connected via a MPLS network for MS Exchange and other shared resources. Currently we have an Internet connection going into one site and making HTTP/HTTPS traffic accessable to the other sites over the MPLS network. We would like to use a secondary Internet connection (Cable for example) and a firewall get the HTTP [...]
Answer Question | November 1, 2010 10:32 PM
Exchange, Firewalls, HTTP, HTTPS, Traffic management
information being entered by any domain computer? We want to track confidential information and make sure it is not getting out of the company.
Answer Question | October 29, 2010 8:01 PM
Data protection, Data Protection Manager, Domain management, Windows, Windows Security
policy and copy policies from one system to another? Can this be done without active directory?
Answer Question | November 9, 2010 5:13 PM
Active Directory security, Security, Security policies, Windows, Windows Server Security, Windows Server Security Audits
A client of mine worked on a database 5 years ago for a research project, but she had to quit for a while for cancer treatments. She’s now responded well enough to go back to the project but her database, done probably in Access 2003 (perhaps even an earlier version, but certainly not a later [...]
Answer Question | November 5, 2010 1:08 PM
Access, Access 2003, Database security, Password recovery, Windows XP SP3
Hi im about to begin my goal in computer information secuirty and risk management….im just curious as to 1) the types of jobs this bachelors would allow me to get 2) what is a starting salary? and 3) what else would you reccomend that i take in the IT Field (school wise) to further excell [...]
Answer Question | October 30, 2010 4:00 AM
Information risk management, Information security, Information security careers, IT careers, IT salaries
For 10 days, I have received literally thousands of un-elicited POSTMASTER or MAILER-DAEMON responses to mail which I have never sent. My in-box is constantly full to the max. How do I stop this????
Answer Question | November 8, 2010 5:13 PM
Anti-spoofing, MAILER-DAEMON, Spoofing
Can we push out windows firewall settings via group policy and then lock out the user from modifying or changing the rules in any way? Can administrators get around this?
Answer Question | October 29, 2010 3:18 PM
Firewalls, Group Policy, Group Policy management, Windows administration, Windows firewall, Windows Security
Can we scan Windows XP workstations for known vulnerabilities in the OS or installed applications?
Answer Question | October 29, 2010 8:24 PM
Operating system security, vulnerability management, vulnerability scanning, Windows XP, Workstation Security
Norton is giving me a message saying a tidserv request2 was block, is this a virus or malware infection?
Answer Question | October 30, 2010 5:01 PM
Anitvirus, Backdoor.tidserv, Malware detection, Norton, Virus/malware attack
I recently upgraded AVG Free 9 &10 to AVG Free 2011. THe first two installs failed and the third one worked. However, throughout the day, I notice a popup screen asking permission to access my internet connection. The message says “hbf.cloud.avg.com” is wanting to access my internet connection. What is hbf.cloud.avg.com? My AVG is set [...]
Answer Question | October 30, 2010 6:45 AM
Antivirus software, AVG, AVG AntiVirus Free Edition, AVG Free, AVG Free 2011, Cloud Antivirus, Cloud AV
What is the difference between a layer 2 and layer 3 network switch? What instance would I need each for? We are a Windows 7 shop.
Answer Question | November 16, 2010 2:22 PM
Layer 2 switches, Layer 3 switches, Networking, Switches, Switching, Switching equipment, Windows 7
What is a session border controller and do I need one for my new VOIP network? All clients are Windows 7 running off a sonicwall pro 3060 network.
Answer Question | October 25, 2010 2:16 PM
SonicWALL, SonicWALL Pro 3060, VoIP, VoIP network design, Windows 7, Windows 7 Administration
Is it possible for to set your lotus notes account to send emails to an outside mailbox automatically (gmail etc)? I recevied a strange message yesterday something to the effect “your forwarded message to your gmail account failed”. I don’t have a gmail account and am concerned I might have a security issue. thanks.
Answer Question | October 27, 2010 1:39 PM
Email forwarding, Gmail, Lotus Notes Email Forwarding, Security, Security in 2010
I currently have a webserver running wamp apache that is connected to the outside world that uses both port 80 and 443 for ssl. I also have a Exchange server 2007 server on a seperate box and need to know how to access owa from the web and smartphones, I have changed the port to 90 for [...]
Answer Question | November 17, 2010 2:46 PM
Apache, Apache Web Server, Exchange 2007, OWA, Port 80, SSL, WAMP Stack
Have this error when trying to access my outlook anywhere….there is a problem with the proxy server’s security certificate error code 20
Answer Question | June 17, 2012 1:18 PM
outlook anywhere, Outlook error messages, Outlook Errors, Proxy servers, SSL, SSL certificate
We want to observe our domain users desktops without their knowledge. Sort of like a spot check. Randomly checking users for non work related Internet activities and what not. Windows XP SP3 on the desktop running a 2003 AD domain.
Answer Question | October 23, 2010 5:31 PM
Internet Monitoring, Windows administration, Windows Security, Windows XP
Can we password protect an Excel 2003 document and what happens if the password is lost? Can it be recovered? If so does this ruin the password protection and illusion of security it provides?
Answer Question | October 22, 2010 5:30 PM
Excel 2010, Windows Security
How do I enable QOS on my network as we are introducing soft phones and IP phones to our network? The network has Windows 2003 servers, a sonicwall FW and a cisco router.
Answer Question | December 5, 2010 5:05 PM
Cisco Routers, Firewalls, QoS, SonicWALL, VoIP, Windows Server 2003
How can I limit the number of requests my computer makes to my router to port 80. At idle, when looking at the connection page of my router I see a hundred or so port 80 Time_Wait from my computer address (say 192.168.1.145) to my routers address (say 192.168.1.1).This has just started probably from some [...]
Answer Question | February 22, 2011 4:33 PM
Port 80, Routers, TCP, TCP Listening Port, TCP Ports