• New system hardening techniques

    I am a student at the University of Advancing Technology in Tempe, AZ. My class is learning more about the Plan-Do-Check-Act Implementation framework. The Harden/Secure step lists several steps that an administrator can take to ensure that a system is strengthened against known attacks, by...

    SystemSaver5 pointsBadges:
  • VNX permission problem

    Hello I want to take a back-up from our VNX (NAS). I start a test back-up and I found a problem. There are files who have only read permissions for the owner not for others. The solution is ACL's i think. Do some of you have experience with VNX ACL's

    jackieserver180 pointsBadges:
  • Strong security measures (hardware and software) for data integrity

    Please help me in choosing how subject would be achieved to defend against hacker attack – especially against information theft and intruders. Critically compare and contrast the different methods (why should i choose certain than others) available...I need it for remote sites and main office.

    DigitalDrop40 pointsBadges:
  • Security setting on Mac

    External hard drive reads files on my Mac, but I can't write files to it. I can on my PC but I can't on my Mac, and it is compatible with both. I was able to read/write files to it on other Macs as new as mine in the past, but it won't let me write to it on my Mac. Where is the security setting to...

    blondred5 pointsBadges:
  • Midi patch files

    My midi patch files for pro tools 8 LE have been altered. What program in pro tools opens these files? Example each file indicates “unknown application”. Daniel  

    Atzererty895 pointsBadges:
  • Symantec Backup Catalog

    How to open the Symantec Backup Catalog for Backup Folder Information.

    a1s2d3f4g55 pointsBadges:
  • Installation Norton antivirus

    Je n'arrive pas à activer l'antivirus que j'ai acheté. Il y a toujours la mention "non activé" malgré mes nombreux téléchargements. Quel pourrait être le problème?

    REMOVALFROMIMLIST35 pointsBadges:
  • Career

    Hi, I want to take a network security course (CCNA, CCNP security) but present I am certified CCNA (r&s). I am working as a network engineer in a small company. I want to move in security domain. Is it good to know the knowledge about CCNP (r&S). Please give me a suggestion.

    iloverevti9915 pointsBadges:
  • SVCHOST.EXE is malware which infects the registry

    How do I delete this registry infection? The problem appears under the name 'INTERACTIVE SERVICES DIALOG DETECTION' and prevents printer function (in my case). I have tried using MS Config to eliminate unknown downloads but that didn't work . Have tried several registry 'cleaners' without success.

    billL50 pointsBadges:
  • Secure username

    How do I secure my username?

    tonyp29310 pointsBadges:
  • Public firewall hotspot system

    Hello Everybody! I was wondering if I can get some suggestions of a good solution for bandwidth management in public open WiFi places. Starbucks for example, what is he using for restricting and controlling the internet connection and why its always good. I would really appreciate help, I tried...

    Mayssamis5 pointsBadges:
  • Encryption

    My son tells me that my Charter.net email does not use encryption. Is this more common or less common? Lee

    autonut15 pointsBadges:
  • How is your company handling Cloud Email Security? Sandboxing?

    With the transition to cloud email services like Gmail or Office 365, IT departments are facing new security issues.  Has your company considered sandboxing your email client to lessen such security risks?

    Chris Leonard4,300 pointsBadges:
  • Is society prepared for a kinetic cyber attack?

    During this year's RSA Conference, security experts Ed Skoudis and Johannes Ullrich detailed how everything from an industrial control system to big financial institutions are vulnerable to a widespread cyber kinetic attack. Skoudis also expressed concerns that society continues to ignore the risks...

    Michael Tidmarsh34,010 pointsBadges:
  • Is Blackberry 10 the best choice for enterprise in terms of BYOD?

    Jeff Holleran, Blackberry's senior director of enterprise product management, claims that the new Blackberry 10 operating system in conjunction with the BlackBerry Enterprise Service 10 provides the best mobile and BYOD system for both owners and companies.  Do you think he’s right and do you...

    Chris Leonard4,300 pointsBadges:
  • Windows 7 and Kerberos

    I am looking for any documentation on deploying Windows 7 in a Single Sign-on(Kerberos) environment. Our XP's work fine, but cannot get a single sign-on connection using Windows 7, 64 bit. We already have Kerberos deployed and working.

    flsts20035 pointsBadges:
  • What’s a typical network design for a LAN with 5 Public IP’s for the FW, Router, Switches

    We are a small company that is planning to move all of our servers to a datacenter. We will have 5 routable Public IP's. We currently have the same at our office. Our current setup has a Comcast Business Gateway appliance with 3 FW's connected to it. Each of the FW's WAN port is set to one of our...

    milesmeridith5 pointsBadges:
  • What steps should the healthcare industry take to lessen the risks of security breaches?

    Along with former president Bill Clinton's keynote address, security will be headlining at HIMSS 2013. With healthcare being the most breached industry in 2011, experts will look at the various ways they can address the many risks. What steps should the industry take to lessen the risks of security...

    Michael Tidmarsh34,010 pointsBadges:
  • Open IT Forum: IT’s role in customer service

    One of ITKnowledgeExchange's bloggers is working on a series about customer service in the enterprise, and how it can be improved. From the IT side, do you have any experiences or suggestions for improving how companies do customer service? We'll take horror stories as well! Help a fellow IT...

    MelanieYarbrough6,345 pointsBadges:
  • Are you familiar with identity management systems?

    As BYOD becomes more prevalent, some companies have turned to identity management systems to safeguard data and employees. Are you aware of identity management systems? Has your company adopted such software tools?

    Chris Leonard4,300 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following