• NAT64 end-to-end security

    How can I offer end-to-end security for NAT64 translation?

    GODIS2G2D10 pointsBadges:
  • VPN configuration

    Dear members, I have a Cisco ASA 5520 firewall. I want connected to another location for VPN. The another end have only for Jupiter ns-25 devise. Its possible to connect VPN. What is the iOS that will be required for both end? What are the authentication and encryption methods will be support?...

    Franklinlobo5 pointsBadges:
  • LAN connectivity problem with Compaq notebook

    I have a Compaq EVO n1020v notebook. This works fine in our office LAN and sometimes it does not at all. Office LAN is a workgroup with ICS enabled in win 2K server. If I check the IP of the notebook it shows the IP of the LAN but never connects to the internet, can't access LAN...

    BinooDas123410 pointsBadges:
  • SMTP transmission failure has occurred using Exchange 2003 and Trend Micro IMSS

    Dear Sir, We use Exchange 2003 and Trend Micro IMSS 7.x, sometimes messages are bouncing back to the sender. Please refer to the email below which I sent from my Gmail account to my company account and it bounces back. Kindly assist, Thanks and regards, Ziad Diagnostic code: smtp;552...

    Zsababa5 pointsBadges:
  • CCNA career

    Hi All, This is the first time that I am submitting my question to this website. I hope I would get best suggestion. I am from non-technical background. Currently I am working with a MNC in non-technical field. Now I want to pursue my career in IT field. Since I am from non-technical background I...

    13035 pointsBadges:
  • Upgrading with Windows 2003 Server

    We have 10 WIN2K servers in our environment. 3 of these servers are domain controllers. The rest are member servers. We would like to upgrade with WIN2003 server. Does any one have any tips or pointers on how to go about this task. Is the upgrade process straight forward or should we think about...

    Crackerjack50 pointsBadges:
  • Virus

    What languages are virus's most written in?

    guslepe265 pointsBadges:
  • Relational design in database

    What does it mean when we say relational schema is best described as being in Boyce-Codd Normal Form?

    Djmace0 pointsBadges:
  • Free remote access desktop application?

    Is there any free remote desktop access application?

    Zeropoint5 pointsBadges:
  • What is IPSec? How to config frame relay?

    How to config the frame relay? with brief example (using all configuration)

    Kaja20048055 pointsBadges:
  • Disconnect an unauthorized wireless device

    When using the Netgear router setup facility, under "wireless devices" I noticed a connected device labelled "Android" and I think someone has gotten past the security and is connected to the router and  network. The guest network is not enabled. The network password is fairly strong and would not...

    Bob3715 pointsBadges:
  • IDS/IPS Where do I find out what I really need

    I have a network which is not external facing, that has been sub-contracted out so that I only interface with trusted networks,so I don't believe that I need to have IDS/IPS above my existing firewalls. Is there any document/policy statement anywhere that defines that?

    colinsids5 pointsBadges:
  • Vulnerabilities increase in security products

    Bad news for security products as a recent survey by iViZ Security Inc., found that overall vulnerabilities in security products released in 2012 rose at a compound growth rate of an overwhelming 37.3% over the past three years. Antivirus products were #1, coming in with 49% of the software...

    Michael Tidmarsh30,970 pointsBadges:
  • What are your top three BYOD concerns?

    In a recent survey by SearchCompliance, 'security' was cited by an overwhelming 96% of respondents as being among the top concerns regarding BYOD/consumerization of IT. Compliance came in as the second-ranked concern in the survey. That got us thinking...what are your top three BYOD concerns?

    Michael Tidmarsh30,970 pointsBadges:
  • Does anyone know how I can get the Security + magazine downloaded?

    When I click on the link where the magazine is suppose to be it takes me to a site index of tons of information. Thanks!

    slick10 pointsBadges:
  • Manipulation Engine Definition

    Hi all! I've read the term "manipulation engine" (related to passwords) in a couple of papers but aside from guessing could not find a proper definition of it (not even in this website !!!). Can anyone please redirect me to / provide a clear definition of this term, related to "Security"? Many...

    DiegoDH275 pointsBadges:
  • How to limit DDoS attacks?

    After the recent Spamhaus distributed denial-of-service attack, many DDoS service providers are concerned that targeted attacks are increasing along with bandwidth sizes. What should we do to minimize the threat of impending attacks?

    Michael Tidmarsh30,970 pointsBadges:
  • How to block pen drive and allow Dongle?

    In domain, how do I block pen drive and allow access to Dongle? How to update GPO regarding above mentioned query?

    123sane15 pointsBadges:
  • Dont want to pay alot for a enterprise backup software

    I have a customer that is on a tight budget and want to backup 20 servers remotley. Symantec and CA are all abou the same price 8-11k. Any enterprise backup software out there that is reliable and is a lower cost?

    Goofeydog20 pointsBadges:
  • Advice

    Please any one assist me. We have a small office and I would like to advice my boss that we should find IT people to come and run computer servicing and maintenance as well anti-virus renew. Since we purchased our PCs, we have never done that. Kindly help me on how I can write a letter. I already...

    Esk145 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following