Hi, My firm is very small and i am planning to start a intranet. Well all goes well when internet is not working. I made a website in my local lan (helpdesk.com- say),and everyone is able to open this website. But when internet is provided to the users, no one can acess the website but [...]
Answer Question | April 6, 2010 11:57 AM
Intranet, Network connectivity, Proxy servers
Is there a way I can control who sends information to a distribution list? For example, if I have a company-wide DL and I don’t want to use ACLs?
Answer Question | March 19, 2010 7:14 PM
ACL, Distribution Lists, Exchange 2010, Exchange Distribution Groups
I want to move away from the Fat client for email and only use OWA for 90% of the company. Issue is I cannot have the end users accessing the email from outside of the building. Is there a way to limit access to the OWA in 2007 or 2010 so that the users will [...]
Answer Question | March 19, 2010 7:06 PM
DMZ, Exchange 2007, Exchange 2010, Fat clients, Outlook Web Access, Outlook Web Access Permissions
I’m creating a new test environment. I made a user called TEST01 with a new testing job description, I’ve added the test library to the top of TEST01′s library list. The files and programs were complied using the test library. I ran the program and it created a new part as it was supposed to [...]
Answer Question | March 19, 2010 7:34 PM
test lab, Test results, Test systems
I am using MYOB to email payslips and get the message “a program is trying to send an email message…” how do i set outlook to do this automatically so i dont have to hit ‘allow’ for each email- IS THERE A WAY FOR OUTLOOK TO RECOGNISE MYOB AS A TRUSTED PROGRAM TO SEND EMAILS?
Answer Question | April 12, 2010 4:00 AM
Our 2003 installed network uses DSL since 2003. We have several IP in use for different servers running in our network since 2003. Now this ISP upgrades us to T1. A new T1 modem is installed, with a new set of IP, Subnet, Gateway, DNS 1 & 2 data for T1. We are told that we have to reconfigure our [...]
Answer Question | March 15, 2010 4:50 PM
Cisco PIX, DSL, LAN, LAN configuration, T1
Where can I find detailed information on Golden Gate software?
Answer Question | March 12, 2010 12:57 PM
compression, Encryption, Golden Gate
I m using SQL server 2000 and I want to use a password field for Employee Master. My question is how to encrypt this password field in my insert query. I have heard about the “EncryptByPassPhrase” function and symmetric key, but it is provided from SQL Server 2005. I have tried using pwdencrypt which is [...]
Answer Question | March 19, 2010 7:00 PM
Encryption, Password, Password field, SQL Server 2000
I recently talked to two Forefront customers, who had a lot of praise for Forefront’s all-in-one management console and its protection against external threats. Any Forefront users out there? What do you think? Do you agree? What have been some of your challenges? Also: what do you consider to be the trade-offs of going with a best-of-breed [...]
Answer Question | March 11, 2010 3:15 PM
Forefront Client Security, Microsoft Forefront, Microsoft Forefront TMG 2010, Microsoft Security, Midmarket security
How can I verify that there are no trojans on my network? I would like to know where I can find signatures for the latest inceptions of the biggies in the trojan world. I do not trust my anti-virus program and want to manually check md5s of files that trojans infect.
Answer Question | January 30, 2012 6:25 AM
malware, Malware removal, Trojan Horse, Trojans, Viruses
1. A member asks how they can apply GPOs to non-domain computers to make sure they don’t get on the corporate domain, and MrDenny, Technochic, Denwood, and SiThu help with a solution. 2. A member asks about business intelligence in a cloud environment. 3. A SQL Server reader asks how to monitor log files in [...]
Answer Question | March 10, 2010 3:27 AM
AS/400, Channel, CIO, CRM, Database, DataCenter, DataManagement, Development, Exchange, ITKE, Linux, Lotus Domino, Microsoft Windows, Mobile, Networking, Oracle, SAP, Security, SQL Server, Storage, Virtualization, VoIP
Good afternoon, I would like to ask if the mobile softwares that filter the sms and calls on white lists & black lists are a spyware that could attack my privacy. Softwares like Mcleaner & Black & White Guard 1.06 from CMI Technologies in Czech? Also is Kaspersky Mobile Security 9 a good guard to [...]
Answer Question | November 1, 2010 4:45 PM
Mobile security threats, Spyware
This may is trivial but I ask it anyway. I found out on the cisco webpage that the cisco asa have a new ASDM and ASA Version. I know how to upload images into the flash, but that is the next step to activate these image plus to get the images?
Answer Question | March 12, 2010 10:41 AM
Cisco ASA, Cisco ASA 5505, Cisco ASA DMZ with DynDNS Host, Cisco ASDM Launcher, Firewalls
Hello everbody, I have set-up my Asa with three VLans (outisde, inside and a DMZ), nearly the same configuration as used in the Cisco Documentation. I have managed to create the NAT and Access rules so I can communicate between the inside and the dmz. But I am not able to manage to get access [...]
Answer Question | March 8, 2010 10:20 AM
ASDM, Cisco ASA, Cisco ASA DMZ with DynDNS Host, Firewalls
Hi, In my present organisation the IT policy states that inappropriate and malicious sites will be blocked. In my last organistation I never came across any such site blocking system.So, I have few queries regarding this. I hope those working for companies where site blocking is present would have better understanding and could help me [...]
Answer Question | March 4, 2010 8:29 AM
Network monitoring, Network security, Websense
I have a 3G WIC card (HWIC-3G-GSM) in a Cisco 1841 and need to create an IPSEC tunnel to a Cisco ASA5520 Normally creating a S2S tunnel would be relatively easy if both peers used static IP’s, however my 3G provider uses dynamic addressing. If I try and create an IPSEC S2S VPN peer on a Cisco ASA [...]
Answer Question | November 17, 2010 10:19 PM
3G, ASA, Cisco, Cisco 1841, Cisco ASA, Cisco ASA 5520, Firewalls, IP, IPsec, IPsec VPN, Routing, VPN
I have a number of dhcp servers installed on DCs in various offices. I need to assign a local admin in one of the remote offices permission to manage the dhcp server in his site not all dhcp servers. If I add admin to the default local dhcp administrator group in ADUC I believe he [...]
Answer Question | March 9, 2010 5:42 PM
Active Directory Users and Computers, Administration, Administrative privileges, DHCP, DHCP Permissions, DHCP server, Domain Controllers
I remember seeing MatriXay tool some years ago and it was pretty awesome. And today I was reading the presentation at Blackhat 2006 of MatriXay and found that MatriXay has released 3.6 version. Does anyone know it better? how about it comparing with others?
Answer Question | March 2, 2010 7:58 AM
Application security, MatriXay
What functionality is currently available in BW to provide HIPAA required protection of data?
Answer Question | March 1, 2010 10:18 PM
Can anyone tell me how to reboot a Juniper Firewall that is in a cluster netwrok. Preferable using the CLI. I appreciate any input, Thank you so much.
Answer Question | March 9, 2010 1:43 PM
Firewall Cluster, Firewalls, Juniper, Juniper firewall, Juniper SRX 210