• Searching for Web Applications

    Hello everyone, In the enterprise that I help manage we have a plethora of web apps that are being used. The problem is, we simply do not know which ones are web based or not many times. I would like to know if there is a way that I can scan the network to find out which app is a web app or even...

    Theratzmanizn5 pointsBadges:
  • Free IT Book: Securing SQL Server

    This week's free IT book is written by one of IT Knowledge Exchange's very own members, Mrdenny. Securing SQL Server promises to help you "secure your SQL Server database so the outside world can't access your internal data." With Mrdenny's extended experience in simplifying SQL speak via his blog,...

    MelanieYarbrough6,345 pointsBadges:
  • Security Policy Confidentiality

    Some of my customers are asking for copies of some of our security policies. I mentioned that the documents were confidential but they insist on providing evidence that the policies exist. Should I give them a copy? These customers all have NDAs with my company.

    Vper10 pointsBadges:
  • Posts SFTP

    When you run the SFTP command from Qshell iseries mode I am presented with the following message: Connecting to 10.100.3.9 ... No user can not access! This message occurs with all users but a few. I want to know what caused this message, thanks

    Hueso9845 pointsBadges:
  • SAML Web SSO: Communication between IdP and SP

    Hello, Assuming a SP-initiated Single sign-on with SAML. After the SSO session is established, which possibilities do I have to establish a communication between the Service Provider (SP) and Identity Provider (IdP) using SAML? As I understood, there are following related protocols: a) Assertion...

    Mmmx5 pointsBadges:
  • Configure SSL on iSeries

    [em]-configure SSH on the AS400 [/em] [em]-connect via a VPN from the desktop of a PC for a Client Access green screen session.  [/em] [em]Ian, they will probably want to connect 400 to 400, so as to transfer compiled objects across ie no source code for ‘restricted’ modules (only a guess)....

    Accenture130 pointsBadges:
  • Free IT Book: Achieving Extreme Performance with Oracle Exadata

    This week you could win a copy of Achieving Extreme Performance with Oracle Exadata from Oracle Press. Chock full of best practices for Oracle Exadata Database Machine deployment and maintenance, this resource covers data warehousing, transaction processing, consolidation strategies, maximum...

    MelanieYarbrough6,345 pointsBadges:
  • Website Blocking on Windows 7

    Dear Sir/Mam We have 40 PC and some laptop, we want to block some specified website. The all system are connected with two switch in workgroup computer, Conection Type: Broadband ADSL2+ is directly conected toswitch and conection is shared to all PC. in windows Xp/Win 7 OS.

  • SAP (HR authorisations). View ex-employees.

    Our departmental SAP HR users currently have access through structural authorizations to their "active" workforce - those employees holding active positions in OM. There is a business need for these users to be able to see records for employees who have retired or terminated from their department -...

    Lebowitz1010 pointsBadges:
  • Remote wipe of Windows Mobile devices connected to Exchange

    How can I remotely wipe a Windows Mobile device connected to our Exchange server? Are there policies or security templates I can use? Does anyone have a walkthrough? If someone leaves the company, we want to be able to delete all the company data from our company owned devices. We can do this with...

    NewnanIT1,110 pointsBadges:
  • Certification Exam Prep

    I am preparing for the A+, Network+ and Security+ exams. Can you recommend some good software to purchase? I currently have a desktop quick reference book.

    Specialk5610 pointsBadges:
  • Forgotten password

    Hi,  I would like to know that how can one open computer if he /she forgets password applied to his/her computer?    thank you !

    Ammarhasan5 pointsBadges:
  • Display AS/400 Password Values

    How can I display as400 password values (exp, length, etc) for audit purposes

    Deadgardens5 pointsBadges:
  • Hercules 4.5 Compliance Check

    We currently use Hercules 4.5 to back up our SCCM for audits and remediations.  When using Hercules audit, the customer receives a pop-up in the bottom right hand of their screen telling them that a compliance check is about to be performed on their system.  The reaction of the customers are...

    Harisheldon19601,420 pointsBadges:
  • Proxy server to monitor employees on Windows Server 2008

    We need to set up a proxy server to monitor employees. How can we do this using Windows Server 2008? What options will we have to block, warn and monitor Internet traffic?

    ITKE347,465 pointsBadges:
  • Online File Server

    Currently our 15 person company has an outdated desktop server. We are looking at changing to an online server for all of our programs and files so that we have access even while traveling. Where can I find the best secure companies to handle our files including financials?

    Dwodz5 pointsBadges:
  • Encrypting a HDD with FIPS-140-2

    Hi all, I know very little about encrypting stuff but is this easyish? Ive been a technician for a while and a customer has asked me to do it for him. Should I send to him a company that do it or can I do myself for him?

    Solsoftcomputers15 pointsBadges:
  • McAfee Groupshield on Exchange 2003 not updating

    I have McAfee Groupshield 6.0.1148.100 running on Exchange 2003. The dat file hasn't updated in a while. Any ideas what it could be and how I can get it to update?

    Troubleshooter24755 pointsBadges:
  • Set up Symantec Endpoint Protection 11 to use proxy server for updates

    How do I setup Symantec Endpoint Protection 11 to use a proxy server for updating to the latest updates?

    Troubleshooter24755 pointsBadges:
  • Catalyst 3750E and DHCP Snooping

    We are using 3750E's and 4500R model switches on our perimeter with DHCP snooping enabled.  We have a central DHCP server and all of the switches write their databases off to a central TFTP server. example:  ip dhcp snooping database tftp://<path> This was working fine until the day we...

    Rreyore5 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following