• Addressing specific IPS from HP Pro Curve or only by port numbers?

    Can we address specific IPS from our hp pro curve 4000m or only by port numbers? If only by port can we set a VLAN for a specific machine to always be in it and apply priority rules to the VLAN?

    Troubleshooter24755 pointsBadges:
  • Assigning wireless encryption

    What methods of assigning wireless encryption codes to our users do we have? I want the process to be automated where they connect to the network and see a web page where they can log in and retrieve their codes. What options do I have?

    TeachMeIT975 pointsBadges:
  • Mobile encryption / security

    I'm looking for companies developing next generation mobile security and encryption. Any suggestions?  Thank you, Matt

    Mattperrini15 pointsBadges:
  • Which certs should I take first?

    Hi everyone, completely new here so.. Here goes my question. I'm currently taking a diploma of Cyber and Digital Security, which covers on networking and ethical hacking (all very lightly). After this Diploma, I'm planning to head more into the network and security side (following the steps of my...

    Benjilee5 pointsBadges:
  • Former employee has credential to webhost, domain reg and dns

    Former employee has credential to webhosting service, domain registration, and dns - what can we do to get back control of our assets?

    Bjfass5 pointsBadges:
  • Remote printer service pose security risk?

    The IT auditors have pointed some of my boxes (SUSE, Solaris 10 and AIX) have [strong]remote printer service[/strong] running and that is a potent security violation. I am confused what is remote printer service and how do I disable the same. I need the help. A prompt response is appreciable.

    RanaSarkar30 pointsBadges:
  • Software firewall that act like hardware firewalls

    i'm looking for a software firewall that filter on a layer 3, filtering by ip/mac/ports only, and ignore completely from files and folders. i tried to config windows 7 firewall and comodo to act like that, but both of them continue to make "decisions" and rules depending on files and applications.

    V470510 pointsBadges:
  • Management of root password in Linux & Unix environment

    Any reference available on best practices for managing root access & passwords in unix & linux env. ?  

    ed15 pointsBadges:
  • Tool for determining how many SIP proxy servers are needed for installation

    How can we determine how many sip proxy servers are needed for a new installation? Is there a tool for this?

    TeachMeIT975 pointsBadges:
  • Do I disable DHCP on my router to create a Windows or DHCP server?

    Do I have to disable DHCP on my router in order to be able to create a DHCP server or a windows server? And how would I configure each?

    NetworkingATE1,545 pointsBadges:
  • Securing a virtualized network

    What's new out there in securing a virtual network? I've done some research and found ALTOR but they've been purchased by Juniper so their product may soon be intergrated with their routers and switches. I'm looking for a defense in depth solution to my question.

    JMan785 pointsBadges:
  • Segmenting a piece of our Windows network

    How can we segment a piece of our Windows network so users from the same subnet can not access it but people on that side of the network and a different subnet can. Currently they can communicate freely between each other.

    NewnanIT1,110 pointsBadges:
  • Is it right to do faculty job after CCNA?

    I am CCNA certified and I want to earn some experience.  Many companies prefer experienced CCNA candidates. So I am planning to join CCNA faculty job in any Computer Hardware and Networking institute to earn experience and then join any company for the post of network engineer. Can companies...

    Yjr15 pointsBadges:
  • Intervlan connectivity

    Hi All, I'm looking for solution/help to solve this issue. Scenario: Two vlans (Data & Voice) are created in my switch (3560). I 've voice router (2900 series) & braodband gateway which connects to the service provider. [strong]Note: Two vlans are connected to two different interfaces of a router...

    RGPrakash170 pointsBadges:
  • Open IT Forum: What IT conferences are you attending this year?

    Below is a list of the conferences IT Knowledge Exchange is planning on attending in 2011. If you or your company is planning on attending any of them, we'd love to see you there. Let us know if our schedules match up, or tell us which conferences you are going to. RSA Conference, February...

    MelanieYarbrough6,345 pointsBadges:
  • Need a stable wireless router – what one to get

    I currently have a D-Link WBR-2310 serving as the outside router for my network, and it likes to reboot irregularly. Sometimes it reboots a couple times a day, causing disruptions for our users who complain mightily. I've updated firmware to the latest (v1.05) and it continues to reboot...

    Fishmahn55 pointsBadges:
  • Inbound traffic is coming from router IP, not internet IP. Why?

    Hello, thank you for your time. I have recently noticed a strange occurence going on with inbound traffic. The other day, I helped my friend set up his network. icmp ping was good. while sniffing, I first noticed inbound tcp traffic to me was not coming from my friend's IP address, but coming from...

    Robert5795 pointsBadges:
  • TrendMicro vs Symantec experiences

    Hi everyone, Some years back, I did a rather exhaustive test to anti-virus software for small to medium business with support for MS Exchange (cleaning and filtering purposes). After some steps and iteractions with vaious products/vendors, TrendMicro and Symantec reached the point of my choosing....

    saturno4,585 pointsBadges:
  • Careers after MCSE certification

    Hi all, i m mcse certified and having good knowledge but not getting any job because every company require too much like third party products whereas no any institute teaches those. so, please help you out coz i m really in dilemma what should i do or to change my line to programming. thankx in...

    Yogender270 pointsBadges:
  • Lotus Notes Database encryption

    Is Lotus Notes encryption linked to the computer on which it is installed? I just moved to a new computer and now there is no access to the database.

    MJK265 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following