Hi. I have confingured exchange server 2003. I’m sending and receiving mails. I have spam program GFI mail essential. and ISASERVER 2006 enterprise edition.But i have this problem: Ican send mail every domain expect one domain. i’ll call this domain test.com. I colled this mail administrator he said me that they dont blocked my domain. [...]
Answer Question | December 23, 2009 8:40 AM
Exchange 2003, Exchange Send/Receive, GFI mail essentials, ISA Server
Do I need to use SSL on the Remote Desktop Gateway in Windows Server 2008 R2? Let’s say I am willing to take the security hit of not having SSL, can I still use the Remote Desktop Gateway for other management features? The reason I am thinking of this is that after looking into Remote [...]
Answer Question | November 20, 2009 1:53 AM
Remote desktop, Remote Desktop Gateways, SSL, Windows Server 2008
I want to make a career in information security field. I have already completed my MCSE. What can I do next to ensure I have a long-term successful career in network security?
Answer Question | December 4, 2009 11:37 PM
Career development, Career in Information Security, Careers, Careers in networking, Information security, MCSE, Network security, Networking
10. The intermediate IBM i 6.1.1 version Mark Fontecchio takes a look at IBM i 6.1.1, and answers the question of how well it fills the gap for those waiting for i5/OS. 9. Using VRDP to view VirtualBox virtual machines remotely Rick Vanover explains some important adminsitration techniques for users of Sun’s VirtualBox. 8. Success [...]
Answer Question | November 19, 2009 6:46 PM
AS/400, Channel, CIO, CRM, Database, DataCenter, DataManagement, Development, Exchange, ITKE, Linux, Lotus Domino, Microsoft Windows, Mobile, Networking, Oracle, SAP, Security, SQL Server, Storage, Virtualization, VoIP
Concept of Trust and Untrust in firewalls ?
Answer Question | December 1, 2009 12:11 PM
Firewalls, Juniper firewall, Trust connection, Untrust connection
If I have a database that has agents with restricted access (set on the Agent Properties > Security tab) and I make a copy of the database for use as a template, the restricted agents are not included in the copy. When I make the copy, I choose the options for Database Design Only and [...]
Answer Question | November 20, 2009 6:01 PM
Access Control List, Lotus Notes, Lotus Notes 6.5.2, Lotus Notes 6.5.x, Lotus Notes 8.0.2, Lotus Notes Access Control List
Our company is trying to use best practices where possible to formulate a policy to cover the backup, storage, security, retrieval and retention of data from the PCs, home drives and Exchange mailboxes of employees that have terminated employment. Our company is publicly traded so the Sarbanes-Oxley (SOX) Act is relevant and we do have [...]
Answer Question | November 30, 2009 5:34 PM
Compliance checklist, Data backup, data retention, Data Retention Policy, IT Compliance, Sarbanes-Oxley Act
Do you have a download limit per user implemented in your environment to prevent excessive network load? How much of a limit do you have imposed? If you don’t, how did you justify the decision?
Answer Question | December 2, 2009 10:23 PM
Network Load Balancing, Network traffic management, Open IT Forum, User Permissions
Greetings, Is there a way to prioritze which ip addresses get to use a license for outside internet access? I have 10 user license and with 10 users, but my servers and printers, etc. are consuming licenses.
Answer Question | November 17, 2009 9:06 PM
ASA 5505 Host Limit reached, Cisco ASA, Cisco ASA 5500, Firewalls
I keep getting this message on my exchange server 2003. The lsass.exe process is allocating more memory than usual. My store.exe is usine 608,556K of memory. What can I do to stop this?
Answer Question | November 19, 2009 7:26 PM
Exchange 2003, lsass.exe, Memory errors, Small Business Server 2003
I have two ISP (Internet Service Providers). How can I balance the load between them (or load balance them) using the router and take their output and send it through one Ethernet port, out to my network? It must be set up this way because I have only one firewall (which has only one Ethernet [...]
Answer Question | August 19, 2010 5:38 PM
Ethernet port, Firewalls, ISP, load balance, Networking, Routing
How do I protect a citrix environment when connected to an end point/PC that is infected with viruses.
Answer Question | November 19, 2009 2:50 PM
Citrix, Virus protection, Viruses
what ports do I need to open on a firewall for Exchange 2007
Answer Question | November 16, 2009 8:13 PM
Exchange 2007, Exchange administration, Firewalls
I have outlook on my desktop, works ok, but when I try to install on my new laptop I have forgotten the password anyone out there that can help
Answer Question | September 25, 2011 1:39 PM
Outlook, Outlook 2003, Password management, POP3, POP3 server
Hi, We are combining an couple offices next week & i need some advice. The networks already have VLANs set up. we have a Cisco 3550 Layer 3 switch set up to route traffic. The servers are on this site also. The network IP’s are 10.1.1.x, 10.1.4.x & 10.1.5.x. Servers reside on all of those [...]
Answer Question | November 16, 2009 4:12 PM
ASA, Cisco 3550, LAN, Network Configuration, Network management, Network Topology, PIX, PIX 506e, PIX 515E, VLAN, VPN, WAN
I would like to pass Basel ii and CISSP examinations. I am looking for a CISSP training course, which will be short and productive, and approximately at the same time, I wold like to have Basel ii training. Can someone suggest a possible solution?
Answer Question | November 16, 2009 1:05 AM
Basel ii, CISSP, CISSP Training, CISSP Training Course
I would like to take the Basel ii Certification, but I feel that I am not ready, does anyone know a training course? Which will be not expensive, and good.
Answer Question | November 16, 2009 1:00 AM
basel, Basel ii, Basel ii Course, Basel ii Training, Basel ii Training Course
Shamus McGillicuddy recently delved into the topic of next-generation firewalls, and I wanted to know — how many of you have implemented next-gen firewalls in your environment? Do you see this as being a legitimate trend for the future, or is it just a lot of hype?
Answer Question | November 20, 2009 9:56 PM
Firewalls, Next-Generation Firewalls, Open IT Forum
10. How to use command line arguments in VBScript via the Wscript.Arguments Object Jerry Lees offers up an indispensible guide for VBScripters. 9. Standard Server 2003 Migration to SBS 2008 Part 3 Roger Crawford’s third part of his series on Server 2003 migrations. 8. Success of 64-bit Internet Explorer Depends on Adobe Tony Bradley explains [...]
Answer Question | November 12, 2009 7:00 PM
AS/400, Channel, CIO, CRM, Database, DataCenter, DataManagement, Development, Exchange, Linux, Lotus Domino, Microsoft Windows, Mobile, Networking, Oracle, SAP, Security, SQL Server, Storage, Virtualization, VoIP
What is the easiest procedure for changing the SA password, and what is the procedure for testing the password change?
Answer Question | November 20, 2009 5:52 PM
SA password, SQL 2005, SQL 2005 admin, SQL 2005 SP3