I am attpemting to athenticate using kerberos on Active Directory – Windows Server 2008. The System i configuration planning documentation maps the user account to the principal on Windows 2000 using ktpass. How is this accomplished using Windows 2008?
Answer Question | June 14, 2010 7:17 PM
AS/400 security, iSeries V6R1, Single sign-on, Windows Server 2008, Windows Server configuration
Does anyone have any code examples of synchronizing passwords on multiple AS/400 systems? Thanks for your tiime!
Answer Question | June 14, 2010 9:36 AM
AS/400, AS/400 Password Length, AS/400 passwords, Password synchronization
Hey guys, I was curious, not because I am unhappy with Safari or anything, but I was wondering about your opinions on different browsers, and how they affect the security of your computer. I wanted to change my gmail so that I can use it offline as well, but it says that Safari is not [...]
Answer Question | July 1, 2010 7:49 PM
Browser security, Browsers, Gmail, Mac OS X, Web browsers
I want to be able to give access to a spreadsheet for a certain period of time, or until a specific date. Can this be done, and what is the most effective way?
Answer Question | June 11, 2010 8:08 AM
Access control, Excel 2007, Windows XP
I am using ISA EE 2006 with windows 2003 I am using Internet Access Monitor for Reporting when I export the report it saves the default Example Report Please suggest me what I have to do Regard’s Hammad Ali Uppal
Answer Question | June 10, 2010 5:34 PM
ISA 2006, ISA Log Expert, ISA Server, ISA Server 2006, Windows Server 2003
Operating System: Windows 2008 2 Database: SQL Server 2008 Enterprise R2 issue: I am trying to creat a binary matrix that manages user permissions. My largest number at present is 135069719 the binary representation is : 101001001110000101001 The largest number I eventually have to handle is a 20 digit decimal number Is this possible?
Answer Question | June 23, 2012 3:33 PM
Binary Math, SQL Server 2008 R2, User Permissions, Windows Server 2008
Currently we have the DMZ ACL in the ASA firewall. One interface that was assigned as DMZ was connected to the core switch and within a VLAN. The server that was untagged to this DMZ VLAN will have the DMZ ACL applied to the inbound/outbound traffic. This was quite simple setup. This issue now I [...]
Answer Question | February 18, 2011 5:43 AM
ACL, ASA, DMZ, Firewalls, IP Routing, Routers, routers and switches
Hi, our usual Domino administrator has recently left the company and I’ve inherited the admin role due to the fact that I was once a domino admin myself. The only problem is that I was an admin under domino 5/6 and we’re now running 8.5 ! One of my first tasks was to decommission the [...]
Answer Question | June 9, 2010 2:31 PM
CA, Certificate authority, Database migration, Domino 8.5
Hello, I am currently doing a Masterthesis on the topic “Formal description of non-functional properties of services in SOAs”, and in this context I am looking for information about how ESBs deal with non-functional or quality (QoS) aspects in practice. More precisely, I’m interested in models and formats for the description of caracteristics of services [...]
Answer Question | June 9, 2010 11:29 AM
ESB, QoS, Quality of Service, Service Level Agreement, SLA, SOA
Hi, I am accessing internet through broadband router. when my firewall off of system i am able to access the internet when the firewall is on i am not able to access the internet. Actually what’s the firewall reports says when system send packet to internet in one port but it is receiving data on [...]
Answer Question | February 24, 2011 6:24 AM
Broadband wireless networks, BSNL, Firewalls, Wireless, Wireless in 2010
When I am uploading files to our server through VPN, there are no status bars? How do i activate one? Also, I believe the other user names have a time limit and a size limit? How do I fix it?
Answer Question | June 9, 2010 9:29 PM
File upload, FortiSSL VPN, VPN issue
how to do 508 testing in a security environment
Answer Question | June 7, 2010 5:41 PM
Auditing software (security), Security, Security testing
I want to configure my proxy server for my network, where all network applications have to pass through it. Can anybody help me out and guide me with how to do the configuration? Please reply as soon as possible, as I have limited time to finish it up. Thanks
Answer Question | June 4, 2010 4:36 AM
Proxy Server Configuration, Proxy servers, Server Architectures, Server management, Servers, Windows Server 2003
dumb question, but we leased a Panasonic digital copier at our work location and then at end of lease purchased it. We never had it connected to internet or networked, but it had the capabilities to scan and fax. it is being used as a copier alone but since we deal with very personal and [...]
Answer Question | June 5, 2010 5:34 PM
Open IT Forum, Panasonic, Security, Security management
IU currently have a network running server 2003. The server is protected by Symantec antivirus corp ,Edition 10.1.8. I need to connect and protect notebooks that will connect with the server with antivirus software. Can these notebooks connect to the same antivirus software that is setup on the network? I tried to run the software on [...]
Answer Question | June 3, 2010 3:07 AM
Antivirus software, Symantec AntiVirus, Windows 7
My annual renewal for Norton is due in 7 days. I have thought of switching to McAcfee. Is that a good move or not, and why.
Answer Question | April 14, 2011 5:01 PM
Antivirus, McAfee Antivirus, Norton AntiVirus 2008, Virus protection services, Windows 7
I have done BSc Computer Science from Mumbai University. What shall i do further which will be beneficial for my future. m thinking of doing MSc I.T. & den RedHat certification which are the RedHat certifications that will prove beneficial for future ? Mostly m intersted in Network and Security Administrator.
Answer Question | October 26, 2010 2:51 PM
Network and system management, Networking careers, RedHat, Security Administrator
Hi, We have different locations connected by two different WAN providers. Each site has a 6224 and two cisco routers with the WAN connections (we don’t have access to router admin). The 6224 connects to each cisco LAN port and to our LAN backbone. We would like the 6224 provide the ip gateway address and [...]
Answer Question | June 2, 2010 1:22 PM
Cisco router, Dell PowerConnect 6224, Grep, WAN
Would you give me guide lines on developement steps and initial requirements of information security fraemeworks?
Answer Question | December 29, 2011 9:02 PM
Information security, IT Decision Frameworks, Security protocols
How to scan intrusions of other connected users IP addresses by SAX (NIDS) after installing and running the same on my personal workstation which is in Intranet of my organization? Please suggest how to check these users IPs by my machine SAX? It connects via my LAN card, so how would this be functioning the [...]
Answer Question | May 28, 2010 7:09 AM
Intrusion management, LAN Connections, XML-SAX