• Exposure on the Internet

    How can I remove myself from being found on the Internet? I have followed all procedures but my name can still be queried.

    weglowde40 pointsBadges:
  • ISA Server 2004 user bandwidth

    How can I manage bandwidth on user basis or machine basis. I want to limit user a to download not more than 50 MB per day and user b 10 mb per day. Also I want to impose connectivity restriction i.e. 10Kbps per user out of 1 Mbps of my bandwidth.

    Maqusman20 pointsBadges:
  • Security enhancement in NAT64

    NAT64 not supporting IPsec. I like to know how NAT64 gets the security offered by IPsec (authentication,Integrity and confidentiality). Is it possible to provide any security enhancement for NAT64 so that IPsec also can be used along with that?

    GODIS2G2D10 pointsBadges:
  • How should an enterprise prepare for a Project Blitzkrieg-style attack?

    Following the recent Project Blitzkrieg attacks (the reported series of financial fraud attacks against large U.S. banks) Nick Lewis offered several security measures that enterprises can utilize to fend off such attacks including: Requiring out-of-band confirmation of financial transactions...

    Michael Tidmarsh34,110 pointsBadges:
  • NAT64 end-to-end security

    How can I offer end-to-end security for NAT64 translation?

    GODIS2G2D10 pointsBadges:
  • VPN configuration

    Dear members, I have a Cisco ASA 5520 firewall. I want connected to another location for VPN. The another end have only for Jupiter ns-25 devise. Its possible to connect VPN. What is the iOS that will be required for both end? What are the authentication and encryption methods will be support?...

    Franklinlobo5 pointsBadges:
  • LAN connectivity problem with Compaq notebook

    I have a Compaq EVO n1020v notebook. This works fine in our office LAN and sometimes it does not at all. Office LAN is a workgroup with ICS enabled in win 2K server. If I check the IP of the notebook it shows the IP of the LAN but never connects to the internet, can't access LAN...

    BinooDas123410 pointsBadges:
  • SMTP transmission failure has occurred using Exchange 2003 and Trend Micro IMSS

    Dear Sir, We use Exchange 2003 and Trend Micro IMSS 7.x, sometimes messages are bouncing back to the sender. Please refer to the email below which I sent from my Gmail account to my company account and it bounces back. Kindly assist, Thanks and regards, Ziad Diagnostic code: smtp;552...

    Zsababa5 pointsBadges:
  • CCNA career

    Hi All, This is the first time that I am submitting my question to this website. I hope I would get best suggestion. I am from non-technical background. Currently I am working with a MNC in non-technical field. Now I want to pursue my career in IT field. Since I am from non-technical background I...

    13035 pointsBadges:
  • Upgrading with Windows 2003 Server

    We have 10 WIN2K servers in our environment. 3 of these servers are domain controllers. The rest are member servers. We would like to upgrade with WIN2003 server. Does any one have any tips or pointers on how to go about this task. Is the upgrade process straight forward or should we think about...

    Crackerjack50 pointsBadges:
  • Virus

    What languages are virus's most written in?

    guslepe265 pointsBadges:
  • Relational design in database

    What does it mean when we say relational schema is best described as being in Boyce-Codd Normal Form?

    Djmace0 pointsBadges:
  • Free remote access desktop application?

    Is there any free remote desktop access application?

    Zeropoint5 pointsBadges:
  • What is IPSec? How to config frame relay?

    How to config the frame relay? with brief example (using all configuration)

    Kaja20048055 pointsBadges:
  • Disconnect an unauthorized wireless device

    When using the Netgear router setup facility, under "wireless devices" I noticed a connected device labelled "Android" and I think someone has gotten past the security and is connected to the router and  network. The guest network is not enabled. The network password is fairly strong and would not...

    Bob3715 pointsBadges:
  • IDS/IPS Where do I find out what I really need

    I have a network which is not external facing, that has been sub-contracted out so that I only interface with trusted networks,so I don't believe that I need to have IDS/IPS above my existing firewalls. Is there any document/policy statement anywhere that defines that?

    colinsids5 pointsBadges:
  • Vulnerabilities increase in security products

    Bad news for security products as a recent survey by iViZ Security Inc., found that overall vulnerabilities in security products released in 2012 rose at a compound growth rate of an overwhelming 37.3% over the past three years. Antivirus products were #1, coming in with 49% of the software...

    Michael Tidmarsh34,110 pointsBadges:
  • What are your top three BYOD concerns?

    In a recent survey by SearchCompliance, 'security' was cited by an overwhelming 96% of respondents as being among the top concerns regarding BYOD/consumerization of IT. Compliance came in as the second-ranked concern in the survey. That got us thinking...what are your top three BYOD concerns?

    Michael Tidmarsh34,110 pointsBadges:
  • Does anyone know how I can get the Security + magazine downloaded?

    When I click on the link where the magazine is suppose to be it takes me to a site index of tons of information. Thanks!

    slick10 pointsBadges:
  • Manipulation Engine Definition

    Hi all! I've read the term "manipulation engine" (related to passwords) in a couple of papers but aside from guessing could not find a proper definition of it (not even in this website !!!). Can anyone please redirect me to / provide a clear definition of this term, related to "Security"? Many...

    DiegoDH275 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following