MY question is I am using Terminal Server to which 100 users are connected with particular IP address.Further the Terminal server is connected to firewall.Now the firewall gives reporting of websites that have been opened and amount of data downloaded.now i want the reporting should of individual users that opened the website and downloaded the [...]
Answer Question | June 26, 2009 11:28 AM
Firewall management, Firewalls, Terminal Server, User tracking
I am roughly one year from graduating with my B.S. in Information Systems Security. So far, I’ve completed my general education requirements, and am now beginning my core and major classes. Lately, I’ve found myself second-guessing my decision of ISS: is an ISS degree such a good idea? Or should I change to a more [...]
Answer Question | June 29, 2009 11:40 PM
Career development, CCNA, CCNP, Certifications, CIO, Computer and Information Science, Information Systems Security, IT careers, IT education, Network+, Security+
I have a client that’s concerned that RSA’s Adaptive Authentication no longer satisfies 8.3, two-factor authentication when the user is mobile, and not using his registered device. RSA’s step-up question authentication and remote user enrollment appears to not be in conformance.
Answer Question | June 18, 2009 3:32 PM
PCI DSS, PCI DSS 8.3, RSA Adaptive Authentication, RSA Security
We have created two VLANs on single Cisco C3560 switch and now want to have inter-VLAN routing. Please explain how to enable it. Please note, we have only one L3 switch, with 10 computers on one VLAN and 10 on other VLAN.
Answer Question | June 19, 2009 12:48 AM
Cisco, Cisco 3560, Cisco switch configuration, Cisco VLAN, InterVLAN, Switch configuration, Switches, VLAN, VLAN Routing
How many kinds of Layer 4 switches are there?
Answer Question | February 27, 2013 8:47 PM
Layer 4, Layer 4 Switches, Networking, OSI, SDN, Switches, Transport Layer Switches
What’s the best way to create high availability utilizing a couple of switches and NIC bonding? I’m looking at stacking four Dell PowerConnect 6248′s, then bonding two NICs on my servers and having one NIC go to one switch and the other NIC to another switch. I’m assuming if the two switches my bonded NICs [...]
Answer Question | June 26, 2009 8:46 PM
Dell PowerConnect, Dell PowerConnect 6248, High Availability, Networking, NIC, Switching
Is anyone aware of a configuration management tool that allows tracking and management of all resources (hardware, software, people, budget and schedules etc) associated with an application? Ideally this would cover both open systems (Linux, MS etc) and Mainframe ZoS. For example, a new project may require part cloning of an existing environment for testing, [...]
Answer Question | October 17, 2010 9:55 AM
Application management, Configuration management, Environment Variables, Relational databases
How do I set up ADS to let uses login to a single account on a CAD workstation where all the licenses and project profiles are setup ? ADS logins want to create separate user accounts on the workstation, and that requires a license setup for each user, which is impossible to manage.
Answer Question | June 18, 2009 9:35 AM
Active Directory, Authentication, CAD workstation, Login, User account management
I would like to create an application that enables a user to store multiple urls with associated usernames and passwords. When a user clicks on a link the application automatically logs the user into the associated url. Unfortunately I cant seem to search for this type of application because all search criteria leads to a [...]
Answer Question | June 22, 2009 4:05 AM
log on, Password, URL
How i can use biometrics in V.B 6.0? any sample code…. Plz help me…….
Answer Question | July 28, 2010 12:34 AM
Biometrics, Sample code, VB 6.0, Visual Basic 6
How can I find out for sure that my computer is being hacked into? I have very good reason to believe that is what is happening. Some people who have no axcess to my e-mail know things that only the person I sent it to should know. I suspect someone who might have a motive?
Answer Question | June 9, 2012 4:02 AM
Desktop security, Email security, Enterprise Desktop, Hacked
I am afraid someone has been using my computer to view inappropriate websites. Is there some way to see what sites/pages/videos have been visited? The history and cookies have been deleted.
Answer Question | December 14, 2010 1:54 AM
Browser history, Desktop security, Enterprise Desktop, Web security
From where should I start to master the concepts of SAN-storage area networks? Do we have a proper sequence, like where to start and carry on?
Answer Question | June 20, 2009 9:17 PM
SAN, SAN architecture, SAN certificate, SAN management, Storage Area Networks
We’ve all had our share of “I wish someone would have told me” moments. If you could give advice to someone who is green in data center security, what would be your best piece of advice? What’s something you wish someone would have told you early on?
Answer Question | October 5, 2009 7:43 PM
Data Center, Data Center management, Data Center Security, Security management
Hi im trying to get my head round if this is at all possible. i have a load of 3524 switches and a single 2620 with 1 ethernet port. is it possible to have setup in this configuration with the equipment i have this part i am ok with and understand vlan6 – switch management [...]
Answer Question | June 16, 2009 12:41 PM
Cisco 2620, Cisco 3524, Cisco switches, Cisco VLAN, InterVLAN, InterVLAN Routing, VLAN
how to config the frame relay ? with brief example (using all configuration)
Answer Question | June 15, 2009 9:54 AM
Access List, Frame Relay, IPsec
Hi all…. Aim: Ip address lets say 10.0.0.1 when assigned to a particular MAC let it be pc, should not be used by any other mac, even if i switch off the device. I tried through dhcp reservation option which maps the ip address to a mac address, it works. but the problem is, when [...]
Answer Question | June 19, 2009 9:06 AM
cisco router or firewall, Cisco Routers, DHCP, MAC address, Network administration, Routers, Windows Server
1. I am running query in which cross apply operator is used 2. That same query exceutes more than 10 times 3. Due to cross apply it increase the time to excute the report
Answer Question | July 8, 2009 8:12 AM
CROSS APPLY statement, SQL Server 2005, SQL Server 2005 connectivity
how can we provide the security while migrating the data?
Answer Question | July 28, 2009 8:06 AM
.NET Framework 3.5, Data migration, Data migration tools, Information security
Can please share the risk assessment methods/ questionnaires/approach for application systems.We understand that the assessment may cover technology, people, and process. We need to come-out with the assessment report indicating the risk level & rating of the application systems.
Answer Question | June 30, 2009 3:49 AM
Application security, Risk analysis, Risk assessment, Risk management