• The Great SPAM experiment

    Hey... this is kinda interesting... supersize-me for spam ;) http://itknowledgeexchange.techtarget.com/it-trenches/did-you-see-this-issue-3

    Labnuke9932,960 pointsBadges:
  • routing loops prevents routing table changes from taking places too quickly and prevents downed links from being added back into the routing table?

    routing loops prevents routing table changes from taking places too quickly and prevents downed links from being added back into the routing table?

    Nicole Facey5 pointsBadges:
  • Sonic Wall is blocking PASV traffic from coming into the FTP server

    Our Sonic Wall is blocking PASV traffic from coming into the FTP server. The connection works okay on port 21, then when the server switches to the PASV ports, the firewall drops the connection, even though the ports are specifically assigned. If I uncheck the FTP Bounce Attack Prevention box on...

    LAN Admin5 pointsBadges:
  • Implementing a facility-wide password management?

    How will a chief ancillary officer go about implementing a password management program?

    Bluesula0 pointsBadges:
  • Point-to-Point VPN through a NATed ADSL Modem

    Greetings, I am trying to setup a Point-to-point vpn tunnel using the Cisco Pix ASA. Here is the scenario: One location got a ASA connected to a Cable modem which assigns its Public IP (static) address directly to the ASA. On the other Location the other ASA is connected to an ADSL Modem which do...

    Fusionex20 pointsBadges:
  • certificate not browsing

    i am having one problem,at the time of uploading any certificate on client form the certificate is not browsing on one computer,another computers all these task is doing properly.what setting require to do for target computer.

    45632150 pointsBadges:
  • Fingerprint Programme to attend and go

    I have a problem when the signature programme for the establishment of a table in the Master of data presentation and the mafia ................................. ACTATEK_LOGS (userID VARCHAR2(20) not null, timeentry DATE not null, eventID VARCHAR2(20), terminalSN VARCHAR2(20) NOT NULL, jpegphoto...

    Nabeil5 pointsBadges:
  • Giving error “This package is failed the digital signature check” while updating Symantec DAT file.

    Giving error "This package is failed the digital signature check" while updating Symantec DAT file.???Please help me for solving this issue.....thanks..:)

    Minimini5 pointsBadges:
  • url validation testing?

    1.when i change (add /n," , ' parameter manipulation) the URL , so now how the web application or websites act? 2. any good business rule or usecase available for the URL validation or Redirection? Regards Prabakar M

    Sibiprabu5 pointsBadges:
  • Security and QSECOFR number of sign-ons

    For security purposes, the number of sign-on attempts can be *NOMAX or as few as one. I configured for 3 maximum sign-ons. Does anyone know if the OS/security sums the total number of sign-on attempts from the device only before it disables the device, or does the OS not count total from the...

    Gmil494365 pointsBadges:
  • Unable to open PDF files after computer restore

    I have windows 7 and my system became unresponsive, so I restored it to 3 days ago. Now I am all of a sudden not able to open my PDF files. I uninstalled/installed Adober readed and still get the message that "These files can't be opened. Your interned security is preventing one or more of files...

    What2do25 pointsBadges:
  • Cisco ACS 3.4

    I have Cisco ACS configured all the routers and switches, but i am not able to login through console port because of policies overridden by the ACS. pelase let me know the command to isolate ACS from the console port.i

    Ekansh400 pointsBadges:
  • access restriction on my Linksys

    Hi Dear Team members, i'm currently working as an IT and system administrator i have implement a windows 2003 server just for file and DHCP, i'm using a Linksys as my gateway, and 6 other Linksys router that i'm using as APs, i trying to set ACL on my gateway router but just when i log into my...

    Chrisone85 pointsBadges:
  • Open IT Forum: How is your company protecting its data from being attacked?

    In his latest blog post on IT Compliance Advisor, independent security consultant Kevin Beaver talked about five ways your company can help prevent a data breach. His list included: 1. Having the right people on board 2. Really understand the risk 3. Approach management and corporate compliance...

    Michael Tidmarsh29,685 pointsBadges:
  • Changed Foxpro 2.6 .dbf file and change doesn’t show up when I run the .exe

    Hi, I am hoping I am posting this in the correct forum. I work for a company that is running a simple tickets database program to track who uses what sports tickets. There is a .exe file and a few .dbf files, etc. About 10 files in a folder to run this Tickets program from Dos FoxPro 2.6 version....

    Djr6004135 pointsBadges:
  • File permissions on NAS shared folders

    Good day to all! I would like some information on best practices for a NAS file server specifically regarding file permissions. Currently, anyone who has access to a folder at my company can delete any item in that folder, regardless of who created the item. I personally feel this is incorrect but...

    Jbcaudle0 pointsBadges:
  • During Siteminder installation we get this error: Additional Notes: ERROR – Unable to locate ASCII text file to be manipulate

    This seems to be a generic error, that I have seen in SAP,,,etc. Is this from a common component, and what is the resolution  

    Sitminder5 pointsBadges:
  • connecting the 5th and 7th floosr of a building

    Hi, Everybody My network covers the 5 th floor of an office building, and now we expanding to the 7th floor (a half-dozen users. All the servers and telecom closet are on the 5th floor and I have to provide network services to the users on the 7th floor. I would like to have the opunion of this...

    Senomango0 pointsBadges:
  • Blocking Internet for users through ISA Server 2004?

    I have isa server 2004, everyone accessing internet, but i want to block internet for someusers, i created rule in isa, but afterthat in my chairman pc, asking for admin username and passowrd when he tried to access internet? He dont lik this type, whenever i Changing policies username and password...

    Cool3045 pointsBadges:
  • How do I set password restrictions in ESXi 5

    I would like convert some ESX 3.5 scripts that implemented password restrictions to work on ESXi 5. In ESX 3.5, I used the esxcfg-auth command which does not appear to be supported in ESXi 5.0, so I need the alternatives. I would like to require the user change his password every 60 days. On ESX...

    Mcioe5 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following