• What are biometrics?

    Can someone explain to me what biometrics are?

    melclay275 pointsBadges:
  • How to locally authenticate users using PPTP on a local PIX firewall

    I need to locally authenticate users using Point-to-Point Tunneling Protocol (PPTP) on a local PIX firewall. Once the users have authenticated, I need them to connect to a Windows 2003 server which is hosted at a remote location securely with encryption or some sort of tunnel. I have already got...

    NetworkingATE1,545 pointsBadges:
  • Hack Skype account password and the chat history from creation of account

    I'm using Ubuntu 12.04 on my machine. I want to hack my son's Skype account without his knowledge and want to check his Skype account history from the creation of the account. I searched a lot but couldn't find the way to hack Skype account. Can someone please help me in this regard?

    rohitp81885 pointsBadges:
  • FortiGuard web filter

    I want to know if can we bypass our FortiGuard web filter. By any means, I have tried all the different VPN software and proxy sites but it's still not working. Torrent is also blocked. Is there any way to by pass it? Please help.

    ravi452295 pointsBadges:
  • Exchange 2000 outgoing SSL

    I have been using exchange server 2000 for a year sending all outbound email through an SMTP connector to SBCGLOBAL.NET with no problems. This last week they changed their protocol to use SMTP with SSL and Authentication to SMTP.ATT.YAHOO.COM. My system stopped working. I have tried to reconfigure...

    InsuranceMan15 pointsBadges:
  • Inter-office email security

    Has anyone heard of or used a solution that can prevent the forwarding or sending of internal emails that contain sensitive info or PI in an Exchange environment? It would seem it would have to happen at the point of creation. Is encryption the answer, although keys could be forwarded just as...

    Scarpochie5 pointsBadges:
  • iSeries SFTP

    How do you setup for secured FTP? Can the process be automated like normal FTP?

    Mitchb145 pointsBadges:
  • Check AS/400 password in PC environment

    I have a VBasic input program on PC which data will eventually be inserted into a physical on AS/400. I would like to make the users to login this PC program. Is it possible to verify their IDs and passwords against those on AS/400? If possible, how am I going to do that? I know it is impossible to...

    Snd2patrick5 pointsBadges:
  • Do I have a virus?

    If I am getting lots of popups coming on most web pages and when I close them down they still appears nothing stops them even Norton's internet security. Also I have been getting phone calls from someone that says my computer is infected and asks me to turn it on so they can talk me through how to...

    AndyAllan15 pointsBadges:
  • Windows Server 2003 File Auditing

    I have File Auditing turned on for several folders- is it possible (free or no cost) to send notifications of the auditing?

    Daizy35 pointsBadges:
  • Digital Signature

    Our HR department would like to go paperless and they believe the first step is to implement Digital Signature for all employees. What is the first step in this process. Suggestions welcomed.

    SYSCO NNE5 pointsBadges:
  • Compatabiity of PcAnywhere and AVG (free) and AVG (paid)

    For years PcAnywhere 11.0 has been used to access some remote computers. When the licenses for Trend Micro were up on three computers, Trend Micro was removed and AVG (free) was installed. Access to the remote computers ceased but access to things like Retrospect (port 497)continued without...

    JimD5 pointsBadges:
  • Bridging two networks together but being able to access both of them?

    Hey Guys - What settings do I need to change to implement the network I'm talking about. I would like to: Use the hardware and exact setup below Be able to access both networks seamlessly * Linksys will have the wireless turned off and will act as a router * All clients will connect to the D-Link...

    Guru ck0 pointsBadges:
  • Can an IPS collect information of all layers like like which protocol and port numbers are being used or it can only sniff till layer 3 detail?

    Hi. I have a scenario where an IPS is connected to the switch and is monitoring all the ports of it. I would like to know that whether this device can capture information till layer 3 (network layer) or it can capture full details of all seven layers, like which application, protocol and port is...

    Rahul Shrivastava330 pointsBadges:
  • How do I protect a citrix environment when connected to an end point/PC that is infected with viruses.

    How do I protect a citrix environment when connected to an end point/PC that is infected with viruses.

    ITKE350,945 pointsBadges:
  • How to break the login password on Windows XP

    How to break the login password of Windows XP, without using Admin account and without formatting the PC. Is there possible to break password in DOS prompt.

    IT Field5 pointsBadges:
  • Enterprise Linux 3rd party support costs

    Seeking info about the cost factor of 3rd party support, as part of the TCO, in relation to Unix to Linux server migrations within the financial IT industry. Is it possible that a mid sized bank (with approx. 10,000 employees) will decide to cancel a planned unix to linux migration of all of the...

    Gidid35 pointsBadges:
  • Exchange Task permission

    Hi, New here. Can someone let me know how to create a Task in Exchange and Limit the permission to the end-user so they can't delete, modify or change it? I want them to simply update it as completed when done so, it will be recurring every weekday. Thanks for the help! (Outlook 2003)

    Jurab5 pointsBadges:
  • i have exchange 2000, i want to secure my server in such a way that nobody can send emails without password

    I have exchange 2000, I want to secure my server in such a way that... nobody can send emails without password (Outlook/Exchange not require password for sending emails). For eg: My email address is owais.siddiq@arwentech.com but my colleague address is zahid.ishtiaque@arwentech.com if i configure...

    ITKE350,945 pointsBadges:
  • Exchange 2003 Cluster – Antivirus exclusions

    Hi I administer a four node Exchange 2003 Cluster (3 active, 1 passive) and need information on the what file/folders etc to exclude from the antivirus program? Thanks

    james9995 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following