• What is the” Progam FilesExchsrvrMailrootvsi2UceArchive” folder?

    My antivirus scanner found a few viruses with on our exchange server. The files had a .eml extension and they were located in the " Progam FilesExchsrvrMailrootvsi2UceArchive" folder. I assume they are emails, but what is this folder for and why are there 2GB of .eml files in it?

    Ingram871,285 pointsBadges:
  • Firewall receiving PINGS from a non-public IP address

    My firewall has been receiving and blocking PING's from the following IP address: 10.40.16.145. This address being a non-public IP address, I'm a bit confused. First, how does this data traverse the Internet when the originating IP address is not a standard public address? Is there any way to...

    Tswirka145 pointsBadges:
  • Bachelor of Science in Security System degree? is it worth it?

    Hello everyone, completely new here so here is my question...I just finished my associate degree in Information Technology and starting my BS in Security System in Criminal Justice in fall 2010. I want to get in to IT Security (Computer Forensic/Security) kinda thing.   Here is a list of some...

    blazes0ldja100 pointsBadges:
  • Free IT Book: Drupal’s Building Blocks

    Today's free IT book is an essential addition to any developer's library: Drupal's Building Blocks. Learn how to quickly build web sites with CCK, Views, and Panels, all by answering one of five questions and posting the link to your answer in the discussion area below. A particular IP range cannot...

    MelanieYarbrough6,345 pointsBadges:
  • A particular IP range Cannot access internet through ISA 2006

    In my organization, we have two ISA servers configured to work in an array. They were configured to allow Internet access from 172.x.x.x series. We had the requirement to allow the Internet from 192.168.x.x series as well. I modified the rule to allow for the same. But in case of 192.168.x.x series...

    Shubham875 pointsBadges:
  • Service login on Windows Server 2003 standard server

    How can I change who a service logs in on a Windows 2003 standard server? Is it the same for services on Windows XP?

    NewnanIT1,110 pointsBadges:
  • Pros & cons of SaaS security solutions?

    Do you have any suggestions or experience with SaaS for web security solutions? Pros & cons? What considerations should we make before shopping for this sort of solution?

    TeachMeIT975 pointsBadges:
  • Earn 50 knowledge points by tweeting out our iPad contest!

    We'll give you 50 knowledge points for sending out a tweet about our iPad contest, happening now through February 16th! Spread the word, earn points, and qualify yourself for an iPad or Amazon.com gift card! Contest details at the Community Blog.

    MelanieYarbrough6,345 pointsBadges:
  • how to get rid of lsass.exe

    I have a dell laptop inspiron 1501 that is just a little over a year old. when we turn it on it loads the windows screen and goes directly to a blue/gray screen that says lsass.exe. Cannot go any further...can i repair this some way by logging on in safe mode? Please help..have been without my...

    Mizzmarxy5 pointsBadges:
  • windows/system32/firewall.cpl error when opening control panel.

    How to fix windows/system32/firewall.cpl prloblem? Ploblem opening control panel shows error windows/system32/firewall.cpl...this somehow affected the opening of few other programs such as Internet Explorer(unable to connect to INTERNET but works well with firefox) and ms office.. 

    Rakei3,260 pointsBadges:
  • Central Windows Server to aggregate Windows security and audit logs

    Can we have a central windows server aggregate all windows security/audit logs? If not does anyone have a script to grab them from domain machines?

    NewnanIT1,110 pointsBadges:
  • Encrypting field in Lotus Notes

    I have a Form with some confidential information in a field. I am sending this document (store form in the document) to a group. Now is there any way that field can be encrypted to certain recipiants of the group. I tried with secretkeyencryption, it worked fine if the document is accessed from...

    SaswatDas5 pointsBadges:
  • Can the SMS content in mobile phone be hacked?

    Can the SMS content in mobile phone be partially changed or the whole message be overrided/replaced by another text? The condition is that SMS is a single message (not concatenated message) and message details such as Service Centre address, Originating Address, Service Centre Submission Time Stamp...

    Mobile Computing ATE15 pointsBadges:
  • Securing SIP signaling without deteriorating VoIP traffic

    How can we lock down and secure all of our SIP signaling so that it is not readable as plain text? The solution can not deteriorate the VoIP traffic either.

    NewnanIT1,110 pointsBadges:
  • Exchange and TMG 2010 port numbers

    can any one, tell me how to enable Port number 995,993 . i am using Exchange server 2010 ,TMG 2010-the port has been disable during the implementation time.i really don't have the knowledge regrading these plz help.

    Redhot2006360 pointsBadges:
  • Active directory with Uniface

    How to use Active Directoy with Uniface Has anyone used Active Directory to authenticate users of a Uniface application? If so, how.  

    Surfinolddude5 pointsBadges:
  • Adding Watchguard static IP for new Exchange server

    I'm having a total brain fart. I set this up before but can't remember how I did it. I have one static IP for External interface. I have a second static IP set to my MX address.  .114 is my main external IP. I have .115 as my mail.server.com record.  I tried adding the .115 as a secondary IP to...

    Sethmorris105 pointsBadges:
  • Earn 250 Knowledge Points now by tweeting out our contest

    We've recently added 250 Knowledge Points to the following profiles for tweeting out our Google Nexus One Challenge: JaideepkhandujaOwenAmbroseCarlosdlRyan8613MarkK Tweet out our Google Nexus One Challenge now and you can also earn the 250 Knowledge Point bonus. Remember that you don't have to be...

    JennyMack4,280 pointsBadges:
  • Managing Orphaned SIDs on AD objects

    We discovered that many distribution groups have had individual permissions assigned using the security tab. Primarily this is because the 'managedBy' field allows only 1 manager to control membership of the group. Unfortunately when a user is removed from AD the SID is left behind on the various...

    Justthefacts15 pointsBadges:
  • High School Computer Lab Network set up to prevent cheating

    I am trying to set up the network in my classroom to prevent students from stealing, renaming, deleting, etc. other students' work on the shared folder. Before the teacher's computer died, I was able to set up the permissions as write only, but the smart student could still rename someone's file if...

    Rollinsm325 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following