what are the steps to configure hardware firewall
Answer Question | August 19, 2009 6:34 PM
Firewall configuration, Firewalls
I saw this new Antimalware tool on SecurityFocus today made by a company called Black List Software. They have a website where you can download Omega and the description says that it can disable malicious software on an NTFS formatted disk from *outside* the Windows OS. I have never heard of this program before and [...]
Answer Question | August 16, 2009 6:52 AM
Antimalware, Black List Software, malware, NTFS, Omega CE, PC Security, Windows
Can KeyLogging be detected and acted upon before it initiates. If yes – How? Thank you
Answer Question | August 19, 2009 3:02 AM
anti-keylogging, keylogs, Phishing, Security products
Which one is important for running a job in subsystem Routing Entry&Routing Data ? (Indetail pls)
Answer Question | September 14, 2009 1:54 PM
Routing, Routing Entry & Data
In a nutshell, which would be a good way of putting together a business case for a solution that mitigates security risks, when the “income” generated by the solution is not easy to define?
Answer Question | August 29, 2009 1:22 PM
Information security, Risk management
Hello guys/gals! I have what I hope is a pretty straight forward question. I have several WinXP Pro machines (non AD domain; all machines are in a workgroup). I would like to run a script after the user authenticates that will display the last date/time he/she logged into the computer. All login events are logged [...]
Answer Question | August 14, 2009 1:20 PM
Scripts, Windows Security, Windows XP
how can you get multiple domains to talk to each other through a sonicwall VPN connection?
Answer Question | August 13, 2009 6:29 PM
Domain management, SonicWALL, SonicWall VPN, VPN
What are the steps necessary to get PGP running on the System i using Open Source like David and his team achieved in ‘PGP System i open source success story’?
Answer Question | April 2, 2010 5:39 PM
PGP, PGP Encryption, System i
i am install window xp in network a system its runing properly but when i am install symantec antivirs softwer, i am show dont send error after install
Answer Question | August 13, 2009 10:54 AM
Symantec AntiVirus, Windows XP
Hi Team, I am facing one issue with my organisation like the user profiles are duplicating and its reating like as user1.00,user1.001 .So There are lots of profile with same user can you please let me know what is the reason of this and is it issue with domain?
Answer Question | August 12, 2009 3:27 AM
User profiles, Windows 2000 Server, Windows XP
Hello All, I want to copy ios of pix version 6.3 from flash to tftp……….. Can someone give me the exact command for this? Thanks Rahul
Answer Question | August 11, 2009 9:53 PM
Cisco IOS, Cisco PIX, TFTP
Hello All, I am trying to figure out how one can block skype from an organisations internal network? The threat here is it has the ability to change the port on which it is communicating. Normally ports 80 and 443 are open on a firewall for web browsing.
Answer Question | February 5, 2010 4:22 PM
Firewalls, Network administration, Network monitoring
Hi I have two Cisco 3750 redundant switches, a BlueCoat, an exchange server, a microwave connection, I want to connect them to a Cisco ASA 5510, and make a DMZ for the exchange server, Please some one give me an optimized diagram for the connection of those devices.
Answer Question | August 9, 2009 11:53 AM
Cisco 3750, Cisco ASA 5510, Cisco switches, Network applications management, Network Diagram, Switches
Dear Sir, Can i get a brief information about ipsec and what does clear ipsec sa peer < peer IP> command do.
Answer Question | August 7, 2009 11:17 AM
Has anyone created a flash drive usage policy?
Answer Question | August 7, 2009 12:36 PM
Acceptable Use Policy, Flash drive, USB Flash drives
How we can block peer to peer(torrent) on server side in Window Server if some body know please let me know Thanks
Answer Question | August 6, 2009 7:32 AM
ISA, torrent, torrent block, Windows Server
¿¿Que se necesita para hacer una lan con el switch cisco 2950 capa 2???
Answer Question | August 6, 2009 8:51 PM
Cisco 2950, LAN, LAN switches, VLAN
I am planning to take up certification in Penetration Testing. Could anyone advise on which certification is more widely recognized or considered best (between CEH & GIAC -GPEN)?
Answer Question | August 8, 2009 6:43 PM
CEH, Certifications, GIAC, GPEN, Penetration Testing, Penetration Testing Certification
i have 2 internet connection in company so before its working through proxy server, now need to change via 2 setelight modem – roter – pix – switch so please help me.
Answer Question | August 4, 2009 5:29 AM
Cisco 1841, Cisco PIX, Cisco Routers
I’m working to get my CISCO ASA 5520 to connect to my CISCO 2800 Series Router and then to 8 CISCO 871 Routers for my DATA CENTER setup. Can I achieved this and how would you do same?
Answer Question | August 7, 2009 11:53 AM
Cisco 2800, Cisco 871, Cisco ASA, Cisco ASA 5520, LAN