• Open IT Forum: What are your favorite network security tools?

    We want to know who and what you trust with your network security needs, from products to software. Had a less-than-stellar experience? We want to hear about that, too! The best stories get 100 points that'll be mighty helpful in our Xbox 360 contest!

    MelanieYarbrough6,345 pointsBadges:
  • SSL with a proxy server

    hI, My first pasot here so id like to say hello to everyone Our company has recently purchased a Data Loss Prevention server and it is my job to implement it , one of its tasks is to act as a proxy sever for all HTTPS traffic, I have done this but every time I go to a HTTPS site in Internet...

    0 pointsBadges:
  • Retrieve the iSeries user ID using only password

    Is there any way to retrieve the user ID from their i5OS user profile using inly their password

    Rsh25 pointsBadges:
  • How do I extract a list of users who have been granted Full Access to other users mailboxes on an Exchange 2003 Server.

    How do I extract a list of users who have been granted Full Access to other users mailboxes on an Exchange 2003 Server.

    ITKE346,360 pointsBadges:
  • Limiting User Abilities

    We have an administrator here that we are trying to limit access on and I wanted to know if anyone else has solved this issue. I spoke with IBM and we have restricted the access to ADDUSRPRF and DLTUSRPRF commands and we have also restricted access to certain user profiles like QSECOFR and QSYSOPR....

    Rayne42710 pointsBadges:
  • Changing to only one DHCP server and the other to a failover

    If we have two offices connected via sonicwall vpn how can we make it so we only need one dhcp server and it can fail over to the other one if necessary?

    Troubleshooter24755 pointsBadges:
  • Authorization problem on DDM file in RPG program

    I have a RPG program that accesses three DDM files on another iSeries. The program compiles, but I receive error CPF9822-Not authorized to file XXXX in library XXXX. Cannot open DDM file. I have *SECOFR rights on both machines. Can someone help me?

    Freckles0 pointsBadges:
  • E-mail hacking

    How can I hack my own e-mail address? Is there software available for this (commercial or freeware)?

    Brainstorm225 pointsBadges:
  • Enabling QOS on Windows Server 2003 network

    How do I enable QOS on my network as we are introducing soft phones and IP phones to our network? The network has Windows 2003 servers, a sonicwall FW and a cisco router.

    Karl Gechlik9,860 pointsBadges:
  • Best enterprise level wireless device?

    What is the best enterprise level wireless device? We have been looking at cisco and sonicwall. What would you recommend to serve up wireless connections for about 3000 users across a 300 acre spot? We want to blanket the community in wifi and have access available everywhere. If there are low...

    ITKE346,360 pointsBadges:
  • Checking when PIX/ASA rules were accessed on a PIX 515e

    I'm a recent hire, and now I've been asked to clean up our PIX/ASA rules. Aside from the show access-list, is there a command  that can help me determine the last time the rule was accessed? Any other tips when cleaning up rule clutter?

    ITKE346,360 pointsBadges:
  • computer associates registry settings

    i need to find the registry key that tracks the anti-virus update date for computer associates software version 8.1

    Breyn5 pointsBadges:
  • Unable to Install this updatee listed?

    ASP.NET Security Update for Microsoft .NET Framework 1.1 on Windows XP, Server 2008 x86 (KB2416447)? I am not able to install the update into computer. Does anyone knows what this is?

    IVANZAMU40 pointsBadges:
  • Updating data to 3rd party without jeopardizing Lotus Notes security

    Hi, My team and I are stuck. A 3rd party needs access to certain information on our Lotus Notes database about clients status and we are unsure on how to go about this without jeapodising security and firewalls. We've thought of a web based application for the 3rd party however how will we send...

    Bukhosi5 pointsBadges:
  • Security, perceived threats.

    Could the more recent predictions about targeted attacks moving from attention to pay-off be actually because after the industry was starting to take the subject more seriously than lip-service, had the effect of eliminating the noise so that now we can hear the state sposored pin drop?

    Papp310 pointsBadges:
  • Windows 7 antivirus to prevent access

    Can the Windows 7 antivirus integrate into the system to block internet or network access upon detecting a virus or threat that could not be contained?

    Troubleshooter24755 pointsBadges:
  • FingerPrint matching

    where to find a good and simple explanation about fingerprint matching algorithms and techniques?

    SYR5 pointsBadges:
  • Unauthorize Volume shadow copy client access by Windows XP Pro Client

    How to prevent unauthorize access by Windows XP Pro (SP2) client station to the Volume shadow Copy service of the Server running Server 2003 software. The client station have not been loaded with the "Shadow Copy Client" software, yet they can see the previous version tab when they click on the...

    Vhocon0 pointsBadges:
  • Auditing User Access in AS/400

    I am trying to figure out how to audit user access at the record level. In the Audit Journal the entry types ZC and ZR tell me at the file level who has opened a file for Change or Read. In the Journal, the Journal code of R along with the type code will give me information on who has added,...

    wpoulin2,480 pointsBadges:
  • We’ll trade you an Xbox 360 for your knowledge!

    The holidays are approaching and so is your next chance to win an Xbox 360 by simply doing what you do around IT Knowledge Exchange. Between today and December 15th, the three members who accumulate the most knowledge points will win some great prizes:   1st Prize: Xbox 360 with 250GB hard drive &...

    MelanieYarbrough6,345 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following