I get a pop up after one minute that says administrator locked. I used the guest but it does not have my desktop icons or folders.
Answer Question | August 21, 2012 9:38 PM
Operating systems, User access
My ireps login id has been blocked i have given complaint to the help desk but there is no use of that can any body help me.
Answer Question | August 18, 2012 11:32 AM
Is it possible to raise a alert whenever a user does a data extract using ODBC or DTF.Using CL program or any other way.
Answer Question | August 17, 2012 6:15 AM
Alert, AS/400, cl 400, DTF, iSeries
Hi, The company I transferred to is using a SonicWALL NSA 240 device for VPN, and firewall (site filter). The odd thing is that you have to use a proxy just to connect to the internet when connected to the network managed by SonicWALL. Other networks from the same ISP work even without the proxy [...]
Answer Question | August 11, 2012 11:21 AM
SonicWALL, sonicwall nsa 240
I configured ASA , but i am not able to ping ASA’s Outside Interface from inside and the natted IP Address The scenario is outside interface 100.100.100.2 255.255.255.240 ISP router interface 100.100.100.1 255.255.255.240 ISP router wan Interface 184.108.40.206 255.255.255.254 ASA Insid e Interface 192.168.1.1 Inside Host ip address 192.168.1.2 Global outside (100.100.100.5 ) subnet 255.255.255.240 [...]
Answer Question | August 4, 2012 1:23 PM
Cisco ASA 5200
Hello, I have a CL function which sends a .ZIP file to our client via SFTP.I have retrieved the size of the .ZIP from our IFS by using QSH to ‘ls -l’ the details and redirect this output to a data area from which I can extract the size. I now need to retrieve the [...]
Answer Question | August 2, 2012 5:08 PM
iSeries AS/400, QSH, SFTP
hi, i want clear mozilla firefox cookie using vb6, can anybody help me? thanks a lot.
Answer Question | August 1, 2012 8:21 PM
Mozilla Firefox, VB6
Which is the best firewall which is compatible to all kind of antivirus?
Answer Question | July 26, 2012 9:10 AM
We have users moving objects from iseries to windows and viceverso. Need to secure them using sftp. Is it possible.? If yes, can i have the steps to configure the same.
Answer Question | July 17, 2012 7:19 AM
iseries and windows, SFTP
I need to create second pair of SSH Keys for a User Profile ,Which has already working SSH Keys. If i normally do with SSH KEYGEN -T RSA ,i believe it will overwrite the existing environment and set new keys…Could You Please Advise me how to do this ?
Answer Question | July 10, 2012 6:37 AM
AS 400, iSeries, SFTP, SSH
Hi everyone, I’ve put in a new SSG520 (6.3.0r11.0) and have some remote users connected via a Dialup VPN. There are several remote users who are configured to have a static IP address. Hosts within the Trust zone need to be able to initiate connections with these remote connected hosts. While the remotely connected hosts [...]
Answer Question | July 6, 2012 4:54 PM
Hi, I am pretty new to firewalls. Recently i’ve saw a topic about Transparent mode. I do not have any idea about this.If anyone knows it, Could please explain with a example. Thanks. Regards, Srinivasa.
Answer Question | July 6, 2012 7:03 AM
How to identify compromised exchange email account?
Answer Question | June 26, 2012 11:16 AM
Email account, Exchange, Security
Hi, I need to implement ASA Firewall in my network and current network topology is Router——Switch—–Servers. what should be best topology to implement the firewall. Please let me know i never configured firwall.
Answer Question | June 19, 2012 4:07 PM
ASA, ASA firewall
For security purposes, the number of sign-on attempts can be *NOMAX or as few as one. I configured for 3 maximum sign-ons. Does anyone know if the OS/security sums the total number of sign-on attempts from the device only before it disables the device, or does the OS not count total from the device, but [...]
Answer Question | June 4, 2012 10:21 PM
QSECOFR, Security, sign-on
In his latest blog post on IT Compliance Advisor, independent security consultant Kevin Beaver talked about five ways your company can help prevent a data breach. His list included: 1. Having the right people on board 2. Really understand the risk 3. Approach management and corporate compliance carefully 4. Have a plan 5. Intellectual property [...]
Answer Question | May 29, 2012 8:23 PM
Security, Security management
Can we do SFTP transfer of files between iseries and Windows. Need the steps to configure the same.
Answer Question | May 18, 2012 12:28 PM
I would like convert some ESX 3.5 scripts that implemented password restrictions to work on ESXi 5. In ESX 3.5, I used the esxcfg-auth command which does not appear to be supported in ESXi 5.0, so I need the alternatives. I would like to require the user change his password every 60 days. On ESX [...]
Answer Question | May 16, 2012 5:34 PM
ESXi5, Password policies
I have Cisco ACS configured all the routers and switches, but i am not able to login through console port because of policies overridden by the ACS. pelase let me know the command to isolate ACS from the console port.i
Answer Question | May 30, 2012 2:48 PM
cisco ACS, Cisco router