• security

    How to secure my server 2003 client only write & Read permission but client do not delete or copy, move permission?

    TusharRajane90216200245 pointsBadges:
  • How to configure Cisco router 2811

    Halo We purchased a Cisco router 2811 with two Ethernet ports: Fast Ethernet 0/0 and Fast Ethernet 0/1, but without WAN interface cards! How can I configure one of the ports to work as a WAN port and the other to act as LAN port, so as to enable the 2811 router exchange information with other...

    1234567tuiojk10 pointsBadges:
  • SFTP using Get with variable file name

    I am unable to use SFTP with a 'get' on a file that has a date variable in the file name using wildcard characters. I have attempted using an asterik as a wild card for the date and I have tried using question marks for the date characters in the file name. I get the error message 'no such file...

    persichr10 pointsBadges:
  • Further enhancing public-private key encryption/decryption

    I am a volunteer with a non-profit organization. Part of my proposal entails encrypting and decrypting Personal Identifying Information, its storage on a database, and transfer over the internet. I would like to use or extend software code that improves upon the public-key and private-key paradigm....

    Pja15 pointsBadges:
  • Share network file

    Hi friends...May I know how to make a file read only for everyone expect admin can control it. Thank you.

    wltan70200375 pointsBadges:
  • SEC & Password Protected Email Attachments

    I work for a company that operates under SEC jurisdiction (financial services).  We have been told that we can no longer use password protected / encrypted files for "discovery" reasons with the SEC.  Is this correct? I email employee compensation and health data all the time as part of my job,...

    ThomasJoseph10 pointsBadges:
  • SVLAN and CVLAN commands for JunOS

    What are the commands for finding cvlans and svlans in Juniper device (JunOS). It's difficult to be specific as my domain knowledge is low.

    firehawk89510 pointsBadges:
  • Compliance

    Within the GRC cycle, how can IT security compliance be best described?

    gbwilson10 pointsBadges:
  • Find a penetration tester

    I need to find a penetration tester who is certified and qualified. Where do I start to look? Thanks

    InvestigateCZ15 pointsBadges:
  • Falsification of an email sent from Lotus Notes

    Hi I needed from a person an important email with an attachment (I give the person a fictious name here: Name familyname) . The person sent me the email he sent, and the answer he received. Here is what he sent me (I changed the content but respected the format). I told the person that they didn't...

    thejumper75 pointsBadges:
  • How will you protect yourself from a cyber attack?

    According to Symantec, cyber crime will become the 'norm' in 2013 as more nations and groups will use cyber tactics to destroy sensitive funds and information. The company anti-virus company believes the top threat will come from hacktivist groups, who will specialize in attacks on individuals and...

    Michael Tidmarsh29,945 pointsBadges:
  • Login for Tiger Ed

    If I forgot my screen name and password for the Tiger Ed. Is there a way I can reset it or find out what it was?

    delivered110 pointsBadges:
  • Changing web server can access back office app through local host but not when it is on DMZ

    We have a Windows 2003 web server, a SQL database, and a Sonic Wall. The existing web server is to be replaced. We can see and log into our back office application on the new server when we are looking at local host but when we put it into the DMZ we cannot log into our database. All the ports that...

    Elziz15 pointsBadges:
  • Backtrack 5

    I used BackTrack to find a wireless web encryption key, the key is found when I enter it and I omitted the :'s it give me unable to get IP address ,although I entered the key using HEX web, so does the key mismatch?

    mkarmi35 pointsBadges:
  • Blue coat question

    Does anyone know what it means if the LED display message "blue coat" is stuck on a Blue coat 400 series. I tried the front panel buttons and they are not responding or changing the LED display message or configurations. I tried holding the left arrow for 5 seconds still nothing. I cant even...

    dselgt5 pointsBadges:
  • How do I install an internet browser on an encrypted virtual drive?

    I created a EVD using Truecrypt.  I opted not to encypt the entire harddrive, as I am a neophyte using this kind of software. I am assuming that in order for my internet browsing to be protected by the encrypted drive, that the browser has to be installed on the encrypted drive.  If that is...

    BobRoberts5 pointsBadges:
  • E-mail spoofing

    E-mail attacks that spoof addresses and attempt to get the recipient to run malicious code are attacks that pose what kind of threat, to which characteristic of data, and in what state?

    hiwa7110 pointsBadges:
  • ISA Error when some users want to visit some sites ISA Server return such type of error/Event ID.12004Error is•Error Code: 502 Proxy Error.

    AOA. Respected all please help me in solving this type of issues. when some users want to visit some sites ISA Server return such type of error/Event ID.12004 Error is •Error Code: 502 Proxy Error. A software error occurred for a Windows Internet extension application that is required for the...

    Muhammad usman125 pointsBadges:
  • IPS Throughput (Urgent)

    How a 5 Gbps throughput IPS can support 2*10Gbps interfaces?

    SamHo10 pointsBadges:
  • Cisco 3825 Router

    Can cisco 3825 router support 45mbps link?

    Network Infrastructure5 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following