What methods of assigning wireless encryption codes to our users do we have? I want the process to be automated where they connect to the network and see a web page where they can log in and retrieve their codes. What options do I have?
Answer Question | February 14, 2011 3:13 PM
Encryption, Encryption key management, Encryption Software, Wireless, Wireless connectivity, Wireless in 2010, Wireless Network, Wireless network security, Wireless security
I have two different GE links in DWDMs . I have a 8 port GE lan switch in both ends. How I can protect my GE link of my customer?
Answer Question | August 23, 2010 9:35 AM
Aggregate function, Dense wavelength division multiplexing, DWDM, LAN switches
Like Oracle Logins how can we create Logins in Sql Server 2005? Please help me……….
Answer Question | August 23, 2010 12:51 PM
Database security, SQL Server 2005, SQL Server 2005 security, SQL Server security, SQL Server Security Login, Windows XP
i have 50 pix firewall and how will i configure these firewall.
Answer Question | August 20, 2010 5:02 AM
Cisco PIX 515E, Cisco PIX Firewall, Firewall configuration, Firewalls, PIX
We want to launch an internal website that only can be accessed from our network clients. This includes remote users. Is there an “allow these IPs” list somewhere using is on a Windows 2003 standard? Or will I need to create firewall rules for this?
Answer Question | August 19, 2010 8:49 PM
Firewalls, Internal Website, IP address, Network access, Network Access Control, Network security, Remote User Authentication, Windows Server 2003 Standard Edition
I am running an ftp server on my windows 2008 server. How can I make it a secure ftp or sftp server? What kind of client do I need to retrieve files from it? Does this work out of the box?
Answer Question | August 23, 2010 2:26 PM
FTP management, FTP Server, SFTP, Windows Server 2008, Windows Server 2008 Administration
Using shadow copy can I set up a shadow copy of an entire drive and not just a shared folder? Can I also do this on workstations like Windows 7? Or am I limited to only server os’es. If so are there hacks or workarounds?
Answer Question | November 1, 2011 2:24 PM
Data Recovery, Data Recovery Software, Hacking tools and techniques, Shadow Copy, Windows 7, Windows 7 in 2010
We have been compromised and one email account is internally sending out a lot of spam. We shut it down and another machine popped up infected and doing the same thing. How can we scan all out bound emails for spam just like incoming email? We use a barracuda 300 spam firewall.
Answer Question | August 19, 2010 8:27 PM
Barracuda, Barracuda 300, Firewall management, Firewalls, Spam prevention
Can I block the use of USB drives or flash drives or any removable media on our active directory network across the board. We are using group policy but I do not know how to configure it.
Answer Question | November 14, 2011 1:51 PM
Active Directory, Active Directory security, Network security, Network Security Policies, USB devices, USB drive, USB security, Wireless in 2010
When I am scanning for wireless networks in my companies head quarters we see all sorts of unsecured outside networks. How can we prevent them from showing up and infiltrating our offices?
Answer Question | August 17, 2010 8:11 PM
Network management, Unsecured Network, Wifi, Wireless in 2010, Wireless Network, Wireless network security, Wireless security
Hello everyone, completely new here so here is my question…I just finished my associate degree in Information Technology and starting my BS in Security System in Criminal Justice in fall 2010. I want to get in to IT Security (Computer Forensic/Security) kinda thing. Here is a list of some course material that I have to [...]
Answer Question | August 17, 2010 6:56 PM
IT career development, IT career planning, IT careers, IT security
This week’s IT book giveaway is A Practical Guide to Linux Commands, Editors, and Shell Programming. Answer one of five unanswered questions then leave a link to your answer in the discussion area below. On Friday, August 20, 2010 at 12 PM ET, we’ll choose a winner from those who answer. Ready, set, go! Juniper [...]
Answer Question | August 20, 2010 4:21 PM
Contests, Exchange Server, Firewalls, Giveaways, IT Books, VPN connectivity, Wifi, Wireless in 2010, Wireless Network
What is the best practice for data encryption? We use wifi and sometimes connect to unsecured networks. How can we use free encryption technology to keep our data safe from prying eyes? Even if someone gets our data I want it to be useless.
Answer Question | August 26, 2010 2:47 PM
Data Encryption, Unsecured Network, Wifi, Wireless Data, Wireless in 2010, Wireless security
What are virtual lans or vlans? What are they used for and will they allow me to increase my networks overall speed and throughput ratio?
Answer Question | August 16, 2010 2:45 PM
Network speed, Throughput, Virtual LAN, VLAN, Wireless in 2010
It’s required to create a new (virtual) interface (with a global IP) that will receive hits and route them to a specific IP behind the INside interface. So basically a policy or route that will do: 1- User opens browser for www.test.com 2- DNS registered to point to our global IP on the new VIP [...]
Answer Question | August 19, 2010 4:58 AM
DNS registration, Firewalls, Juniper, Juniper firewall, Juniper SSG 550, Policy Based Routing
I have 4 email accounts. All four show messages when Inbox is highlighted in T-bird. But when I start T-bird, it automatically goes to my default account (1 of the 4) rather than to Inbox so I can see all msgs. How can I make it go to the Inbox when T-bird starts up so [...]
Answer Question | August 16, 2010 5:53 PM
Email accounts, Mozilla Firefox, Multiple email domains, Thunderbird
I want to password protect my work email on Outlook. How do I do this?
Answer Question | August 16, 2010 12:41 PM
Outlook permissions, Outlook security, Password Protection, Privacy Protection
How do we configure exchange 2003 or 2010 to forward email with subject line [secure] out of the exchange server and to our encryption box. All email in and out of our enterprise encrypts just fine, but email among users within the same exchange server dont get forwarded to out of then exchange server and [...]
Answer Question | August 16, 2010 6:00 PM
Active Directory, Encryption Software, Exchange 2003, Exchange 2010, Exchange Encryption, Exchange Forwarding, Outlook, Voltage
How do I tell exchange to never mark messages from a particular sender (that is in my contacts) as spam? It doesn’t seem to matter what version of outlook I’m using (03 or 07) and I have done all of the updates. I have deleted my ost file and had exchange rebuild it. I have [...]
Answer Question | August 31, 2010 11:03 PM
Exchange, Exchange spam filters, Outlook, Outlook 2003, Outlook 2007, SBS 2003, Small Business Server 2003, Spam Filter
There is 1 ip because of that spamming is generated so what can i do to resolv the problem.
Answer Question | August 16, 2010 6:55 AM
IP address, IP address conflicts, IP address management, Spam, Spam prevention, Spamming