• SQL Server restore job fails

    I've created a Restore Job under SQL Server Agent. Job owner is sa, Run as User dbo. There are no users connected to the database or processes running. The job fails with: Msg 3101, Sev 16: Exclusive access could not be obtained because the database is in use. [SQLSTATE 42000] Msg 3013, Sev...

    TuftsDBA0 pointsBadges:
  • Front-End Reporting Tools for Secure Web Service Application with MS-SQL server-2

    Hi... We are a Cdn Govt agency involved in Satellite Operations with a commercial partner based across the country. We will need to build/buy a small secure web service application for reporting purposes that will require minimal IT expertise to build or maintain, and will deliver maximum...

    Mmosystem0 pointsBadges:
  • SQL Server 2000/2005 – Creating Unique Constraints allowing multiple NULLs

    Hi there! I'm having a problem maintaining data integrity on a database table in MS SQL-Server 2000. To ensure maintaining the integrity I need to implement a Unique Constraint on one of my coloumns. The problem however is, that this coloumn also has to allow multiple NULL-values - but for every...

    LeChuck0 pointsBadges:
  • radiation dose conversions

    Hi how do you convert 10micro gray metres squared to millgray or decigray centimetres squared?

    conor5 pointsBadges:
  • How can I bind IP address to MAC address of PC

    I have ISA Server 2004, only selected users are allowed to access internet. Here my requirement is to allow selected LAN users to access internet only from their machine. I have tried allowing them through IP based. IP based: a user can ask or guess someone IP and put in his machine and get access...

    pdsathishkumar3,790 pointsBadges:
  • Is it possible I was hacked through my VPN?

    I have a hacker problem. I am using a VPN that specifies it is USA on an iPAD, and is Apple approved. When I log into my email it always gives a California or Texas IP address, with one exception: Once a week it says I have logged in from Dubai. I was actually logged in when this happened and the...

    ITKE352,580 pointsBadges:
  • Deleted Object not Found in Audit Log

    I found a Program object present in the system when I did a DSPOBJD for a library last week. But today, when checked the object is not present in the system. I checked the AUDIT Logs (DSPAUDJRNE, DSPJRN, CPYAUDJRNE) with DO, MO etc. But this object has not been registered anywhere in the Audit logs...

    AdminAS40015 pointsBadges:
  • How to make all branches visible to others

    I need a help please. I have fortigate 80c connected to 16 branches through IPsec VPN and all is fine. What I need is to make all branches see each others. I have a trend-net device in each branch.

    ITDeptsd10 pointsBadges:
  • DosCreateMutexSem privilege escalation

    I am looking for an explanation of how a privilege escalation hack would be able to be inserted with a call to doscreatemutexsem function from a windows service that is running under the local system account.  I was unable to find anything on Google and not being a security expert I just don't see...

    CarlCioffi345 pointsBadges:
  • Receiving error message connecting to SQL Server 2008 R2

    I'm trying to connect to SQL Server 2008 R2 using Windows authentication. However, I can't because I keep getting this error:Login failed for user 'AVATOPIA\ian'. Reason: Token-based server access validation failed with an infrastructure error. Check for previous errors. [CLIENT: ]Now, I can log in...

    ITKE352,580 pointsBadges:
  • Scanning Active Directory for weak passwords

    Is it possible to scan our active directory and see if people have weak passwords? We have upped the password policy but what about for users that already have passwords and are not scheduled to changed them yet?

    Troubleshooter24755 pointsBadges:
  • Controlling VPN access

    Here's my scenario. I fall under guidelines of HIPAA. I have mobile users using laptops and tablets loaded with Cisco VPN CLient connecting to my Cisco 2811 ISR which functions as my router/firewall/VPN. I am using Micorosoft AD in my domain. To authenticate users to the domain. Is there an easy...

    Gforsythe75 pointsBadges:
  • Cache-based side channel attacks

    Please help me find a new secure mechanism against cache based side channel attacks in the cloud. I found that ieee published a method for security against AES, RSA, BTB attacks to retrieve the secret key. It is architect based method. Can I do any modification to this work after implementing this...

    mvidya199020 pointsBadges:
  • Error Code 64: Host not available – ISA error

    Hello Sir;   When I am accessing the  internal website from other system, I get below error. How can I bypass internal broadcast  from ISA server?   I alread bypass from  broweser's internet option but still same issue.   With Regards Bhupendra Jesalpura 9426372705

    BhupenJesalpura10 pointsBadges:
  • Delivery Failures for mail I did not send – Spoofing or Trojan

    I'm getting delivery failures for email I didn't send. It's probabaly someone spoofing my account, but could it be a trojan sending emails directly via SMTP? How can I tell? Is there a way to query the SMTP service for a list of sent emails?

    Eag5 pointsBadges:
  • HIPAA audit on virtual network

    I'm hoping to find a solid, inexpensive network auditing tool for virtual networks as prep for a HIPAA compliance audit. Does anyone have suggestions of open source or pay tools they'd recommend? Do I need to pull in an outside party for this?

    Michael Morisy8,323 pointsBadges:
  • FOXPRO 2.6 FOR MS DOS DATABASE CONVERSION

    I have a .dbf file from my dental software (FOXDENT V7.0B) MS DOS program that allows the printing of a standard 1994 American Dental Association form. HIPAA is now requiring the 2006 format- Mostly the government and Medicaid forms. Can anyone help me with this conversion as this software has...

    Cephid5 pointsBadges:
  • Personal E-mail at work (aol, gmail)

    I am looking for documentation to support blocking personal e-mail at work(aol, comcast, hotmail etc) for virus and HIPAA compliance regions. Can anyone direct me to any publications that support this? Thanks!

    Itadmin34775 pointsBadges:
  • Network Security Auditing tools

    Hi all - I'm hoping somebody out there might have a suggestion for me. My company unfortunately falls under Sarbanes Oxley and we need to audit all of the network directory security. The down side of this (ok well it's all down) is that we are a small company, no money to spend on getting the...

    Lirria0 pointsBadges:
  • Windows 2003 Server configuration

    I have been asked to configure a new server for a small Health care clinic. Previously they were using a Dell Dimension as a file server with open shares throughout the network and all users logging in as administrators. Considering the risks involved with HIPAA (Health Insurance Portability and...

    Stuntz0 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following