1. JHite ran into an Outlook 2003 display name issue for contact with multiple email, and XENOPHON22, Mrdenny and Carlosdl helped out. 2. Windows Server 2003 is giving a member some installation trouble, and MrDenny offers some advice. 3. Can you block Exchange 2007 admins from viewing other admin’s mailboxes? No, according to Technochic and [...]
Answer Question | February 17, 2010 3:36 PM
AS/400, Channel, CIO, CRM, Database, DataCenter, DataManagement, Development, Exchange, ITKE, Linux, Lotus Domino, Microsoft Windows, Mobile, Networking, Oracle, SAP, Security, SQL Server, Storage, Virtualization, VoIP
My CA sessions keep dropping. My VPN connection is solid. I am using standard VPN provided by Windows XP. If I start up a MochaSoft session first (do not even need to sign on to AS/00) All my CA sessions stay connected. How come I have to have MochaSoft up to keep CA sessions going.
Answer Question | February 21, 2010 3:37 AM
CA, Client Access, Client Access Sessions, VPN
Can you please tell me the format for the sftp command to be able to include the username & password. I have tried something like this SFTP firstname.lastname@example.org but with no success……..thanks
Answer Question | May 25, 2010 4:58 AM
AS/400 FTP, AS/400 security, SFTP
In a recent SearchMidmarketSecurity.com article, contributor Mike Chapple says, “Unfortunately, many security practitioners don’t fully understand encryption due to the technology’s ill-deserved reputation as the unapproachable domain of mathematicians and cryptographers.” Do you agree? And what encryption task do you find most challenging: Securing websites? Encrypting email? Protecting laptop data? Implementing VPNs?
Answer Question | May 1, 2010 8:34 PM
Encrypted email, Encryption, Encryption key management, Midmarket security
I AM NOT FAMILIER IN ISA,IN WHICH OPTION IN ISA I CAN RESTRICT INTERNET ACCESS?INCLUDING CLIENT SETTINGS.
Answer Question | February 16, 2010 3:43 PM
Blocking websites, ISA, ISA Server, Microsoft Internet Security and Acceleration Server
What does syncronising the two different passwords mean? For example: What does the folowing paragraph mean? “All three groups of users may now receive an error or be prompted for a password. In this case, the user should enter their network password (the one they use when they first log onto the network with their [...]
Answer Question | February 15, 2010 2:36 PM
LDAP, Password synchronization, SAP, SAP user authentication
how can i by pass cmos password for my dell
Answer Question | September 20, 2010 11:36 AM
CMOS, User authentication, Windows authentication, Windows XP
We forget our system administrator password. Kindly advise how to open the system
Answer Question | June 26, 2012 7:27 AM
Microsoft System Administrator, Password recovery, System administrator, Windows authentication, Windows password recovery
Do you have an official policy on unauthorized wireless networks in your environment? How do you go about detecting and disabling unauthorized devices, and what are the consequences? How often do you encounter this problem in your business?
Answer Question | February 23, 2010 8:51 PM
Network performance, Network permissions, Network security, Network Security Management, Wireless LAN, Wireless networks, Wireless routers, Wireless security
[strong]I want to become an IT Auditor and want to come to a [em]management level[/em]? What course should I do afer finishing CISA that will help me grow financially, and will increase my salary?How can I come to a management level in a company/bank?Please help me find the right path. I want to know what [...]
Answer Question | February 25, 2010 5:45 PM
CISA, IT training and certifications, Security certifications
What is the difference between NAC and 802.1x? Can you implement 802.1x without NAC? My understanding is you could implement a NAC solution not utilizing 802.1x but not the other way around. Thanks Rick McGee
Answer Question | February 13, 2010 4:20 PM
802.1x, Cisco networks, NAC
Sir/Mam, Is there any Career in Ethical Hacking. If so then please guide for me the same. I am in the Final year of Computer Engineering from Mumbai University.
Answer Question | February 23, 2010 3:48 PM
Information Security Career, Security careers
We have a number of mapped network drives and one of them is l linux mapped drive. When users search they tend to search all drives. When the Linux drive is searched it slows the linux server down for all users. How can I prevent them from searching a drive letter? I found this but [...]
Answer Question | February 25, 2010 10:01 AM
Group Policy, Network permissions, Windows Server 2003, Windows Server Permissions, Windows XP
Hi is the any application which can audit machines on the network.
Answer Question | February 23, 2010 7:15 AM
Auditing, IT auditing, IT auditing software
Can a Sniffer port with port mirror configured pass data traffic?
Answer Question | February 10, 2010 4:42 PM
Network connectivity, Network Monitoring Tools, Network security, Sniffer software
A large company is working on a new project that requires cloud computing. If they utilize their private network they can reasonably assume their data to be secure, given that all protocols with remote access are followed or the private network does not allow remote access.
Answer Question | December 16, 2011 8:21 PM
Cloud Computing in 2010, Cloud computing security, Knowledge Point Challenge, Security
I’m hoping to find a solid, inexpensive network auditing tool for virtual networks as prep for a HIPPA compliance audit. Does anyone have suggestions of open source or pay tools they’d recommend? Do I need to pull in an outside party for this?
Answer Question | March 9, 2010 6:48 PM
Cloud Computing, Cloud Computing in 2010, HIPAA, Knowledge Point Challenge, Virtual networking
With so many people worry about virus/spam out in the cloud and looking for a safe haven would this reduce the below work to reduce virus/spam. Windows has a rep for having virus, so if I decide to use a Mac and install Windows as Virtual. Would any virus or spam be stop by the [...]
Answer Question | February 9, 2010 4:13 PM
Cloud Computing in 2010, Mac OS X, Windows Security, Windows Virtualization
Hi, I have newly joined an AUTOMOBILE company as an IT supervisor. We have about 10 branches connected with each other thru different WAN connections (Leased line,MPLS,VPN over DSL,..etc) and with different service providers. Our ERP system is based in Head Office and the DMS (Dealer management system) is based in our main branch. I [...]
Answer Question | April 13, 2010 2:32 PM
ISA Server, ISP, Lotus Domino, SAP, WAN, WAN Connections, Windows Server 2003
The latest buzz around Cisco is that its latest iteration of its emulator OS, IOS 15, will help the company crack down on the use of its IOS emulator without plugging in a product key — something many home network pros and enterprise network managers have relied on until now, especially when needing to map [...]
Answer Question | February 8, 2010 9:00 PM
Cisco, Cisco IOS, Cisco IOS Emulator, Cisco Routers, IOS, IOS 15, Network hardware, Open IT Forum