• How to conduct an IT General Controls Audit for a Holdings & Investments Company and a Real Estate Company (Developers)

    How to conduct an IT General Controls Audit for a Holdings & Investments Company and a Real Estate Company (Developers) using HP Servers, Windows 2008, windows 2003 (backend) and Red Hat Operating Systems.

    PankajR5 pointsBadges:
  • IFS on Iseries

    After sharing a folder in the IFS i can access it via the windows network, I can paste a file in the folder but cannot delete it, I get a message "Cannot delete :There has been a sharing violation the source destination file may be in use" I have stoped & started the netserver & added my user in...

    Jungojo0 pointsBadges:
  • SPCAUT = *NONE

    What can you do on the command line if you have it but have SPCAUT = *NONE. I'm just trying to understand the risks and the benefit of having it = *NONE. My understanding is that there is no risk as you cannot do anything, but if that is the case, can I set the LMTCAP = *YES?

    Guy553435 pointsBadges:
  • How to remove js.alescurf virus

    Need help to remove JS.alescurf virus. Had symantec endpoint installed and is infected with this virus and unable to remove. Microsoft security essential also unable to remove. Do you have any clues which registries to retifier. Using removal tool for removing JS.alescurf.D and JS.alescurf.A are...

    6827888810 pointsBadges:
  • Bachelors of Arts in Information Technology

    I need to know with Bachelors of Arts in Information Technology with a concentration in network and information security, would I be able to secure a job just as well as a person with a Bachelors of Science in Information Technology?

    Persuing20145 pointsBadges:
  • AUTL security over IFS objects conundrum

    We are still running V5r4, and I'm currently wrestling with securing objects in /Root of the IFS. Objects are required to be read only in normal circumstances. an application allows a user to copy the object (document) and removes the readonly attribute from the object using CHMOD called from...

    Yorkshireman5,580 pointsBadges:
  • Password recovery

    how can i recover my password or resset password

    Toshuba5 pointsBadges:
  • AS400 Virtual IP

    Im trying to implement virtual IP in my AS400 machine. Currently, I have 3 physical lines (eg. ETHLIN01,ETHLIN02,ETHLIN03) running under 1 card. Given my setup, Im having the following concerns. - While connected to Virtual IP, I deactivated one of the physical ports (ETHLIN03), and  the session...

    Jerico125 pointsBadges:
  • AS/400 FTP error 23

    I am trying to make a *ssl connection to another server and keep getting FTP Secure connection error, return code -23

    AS400Suz15 pointsBadges:
  • Migrating from Novell 6.5 to Windows ???

    Hi, In the coming weeks I'm going to be migrating our file storage data from a novell netware 6.5 server to a windows 2003 server...basically for financial reasons. And I feel netware and microsoft are moving to far apart and it just doesnt run as smoothly as it used to... My question is what would...

    Ladrick0 pointsBadges:
  • Temporary Internet Files ( long file names – can’t delete )

    I have come across a few files on several computers that have files with long names in the temporary internet files folder. The files can not be renamed or deleted. Has anyone come across this problem before and if you have, Please let me know what worked for you. I have tried deleting the files...

    Sheldonrw0 pointsBadges:
  • Is paying a training school worth the money to obtain certifications?

    Hi, I am currently considering enrolling in an IT training program that supplies all training and materials along with the testing for 7 certifications (A+, Security+, MCTS, MCP, MCSA, CCENT & CCNA) Everything is included in the tuition along with a new computer to do the training on. The cost is...

    RMTsot5 pointsBadges:
  • Open IT Forum: What tech CEO would you vote for?

    Michael Morisy recently reported on a primary of off-ticket, independent candidates, which included Cisco CEO John Chambers. Not to get too political, but we were wondering if there were particular tech CEOs that you admired for one reason or another. Share your thoughts -- or your vote -- and...

    ITKE351,865 pointsBadges:
  • Laserjet open ports

    I ran Nmap to scan my HP4005 and HP4705. Both reported that port 14000 is open and tcpwrapped. Can anyone explain why this port is opened? Thanks

    Haroldbluetooth35 pointsBadges:
  • symantec tamper protection alert

    Can anyone tell me what this means......... Symantec Tamper Protection Alert Target: C:ProgramFilesSymantecSymantecEndpointProtection12.1.671.4971.105BinccSvcHst.exe Event Info: Open Process Action Taken: Blocked Actor Process: C:PROGRAMFILESMICROSOFT WINDOWS SMALL BUSINESS...

    Cptsrus15 pointsBadges:
  • IT Security Career Path

    Hi, I am 30 years old and working as a Service Desk L2(Desktop) in CSC. I like to get into IT Security or Network Security. But I am not completely aware of that. So can any one help me in choosing my Security career path. I like to have the certifications list in order to become a Security...

    Eowiitb10 pointsBadges:
  • Assessment tools

    Are there any heterogenous storage assessment tools which can provide details on storage layout, performance, data access, etc.

    VasudevNagaraj5 pointsBadges:
  • Career in Computer Security

    Hello Lee and Mike I am doing Masters in Computer Security from the well known university. I am slightly confused about my career after masters. Some times I think it's better to be a security consultant and on the other side sometimes I think I should work in a company. But I am not sure with my...

    Himanshu2315 pointsBadges:
  • Win a free Microsoft SQL Server 2012 Pocket Consultant book!

    Interested in managing server groups and server activity?  Enter for your chance to win a brand new 2012 Microsoft SQL Server Pocket Consultant book Microsoft expert William R. Stanek.  To win, e-mail Michael@ITKnowledgeExchange.com explaining your security priorities for 2012. Good Luck!

    Michael Tidmarsh33,120 pointsBadges:
  • Where can I find record that my computer was attacked?

    The following question was sent to SearchWindowsSecurity.com by a user: Some hackers attacked my computer and shut it down. No port scan program or logger is reporting an attack. What's going on, and where can I find record of the attack?

    LMullen0 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following