• Could a honeypot machine risk the secure network?

    If I place a honeypot machine on my dmz what are the possible consequences? We want to see the possible issues lurking around us to better prepare for them. If we have a susceptible machine unpatched and asking for it could the rest of the secured network be at risk?

    ITKE347,785 pointsBadges:
  • Run out of addresses on SonicWall pro 3060

    We are using One to One nats on a sonicwall pro 3060. We have run out of addresses.We use them for remote desktop. There has to be a better solution. Has anyone found one yet? We have server 2003, 2008 and XP, 2000 and 7 clients.

    TeachMeIT975 pointsBadges:
  • Answer a Question, Win The Official Ubuntu Server Book!

    At the beginning of the month, we gave away The Official ubuntu Book, and now we're giving away The Official ubuntu Server Book, Second Ed.! The book includes a DVD that contains the versions of Ubuntu Server needed for different CPU architectures. You also receive a code for a free online version...

    MelanieYarbrough6,345 pointsBadges:
  • server temporary freezing

    I have Dell poweredge 700 with Dell CERC SATA 1.5/6ch Raid controller card in RAID 5 I have about 20-30 stations connected to it at any moment. The disk queue is small below 1 from time to time people will experience desconnection problems such as i will try to access file and server will stop...

    Dimchik0 pointsBadges:
  • Kerberos unconstrained delegation for MS SQL svc account

    Can an MS SQL service account run non-SQL services if "trust this user for delegation to any service (Kerberos only) has been enabled?

    Calicdaj5 pointsBadges:
  • Advice on wireless switching/routing and HP Procurve 2510G purchase?

    Hi, I'm thinking of purchasing the above model of intelligent switch(partly on monetary factors) for our network and I would appreciate any advice. I understand different Switches have different attributes such as layer 2 and layer 3 swicthing/routing . Also some work symmetrically/asymetrically...

    Pelvicthrust170 pointsBadges:
  • Data encryption best practices

    What is the best practice for data encryption? We use wifi and sometimes connect to unsecured networks. How can we use free encryption technology to keep our data safe from prying eyes? Even if someone gets our data I want it to be useless.

    ITKE347,785 pointsBadges:
  • Fix Patch 4 on Lotus Notes 8.5.1 client

    Problems with running with fix Patch 4 on  Notes 8.5.1 client.

    4410 pointsBadges:
  • TZ 100 Hang, ping with no response and vpn drop and reconnect

    TZ 100 is keep working but there is no response through http management. Firmware 5521 and 5520 have used but no improvemenet. VPN drops and reconnect all the times. I have adjusted the TCP/IP timeout to 60 Seconds. Unfortunately, it is useless.

    Atracc5 pointsBadges:
  • How do I find Route ip Address to query ipRouteNextHop ?

    How I find Route ip Address to query ipRouteNextHop ? in other words how find yellow segment  that it is the result of requesting  into 192.168.128.17?

    Rezvan15 pointsBadges:
  • System Administrators Access in a HR/Payroll System

    Hi I have taksed to define the access rights for sys admins for a HR/Payroll system. The thoughts are divided among the groups here - one, the segretion of duties that should limit any type of user to perform tasks end to end since this is a payroll system; two since it is a sys admin access the...

    Cognos20015 pointsBadges:
  • Appropriate configuration for adding a wireless router to a wired network

    What is the appropriate configuration for adding a wireless router to my wired network without affecting the network. This will be for visitors and does not need access to the network other than internet and printing. I would like to separate this out to our dmz. Are there white papers on this?

    TeachMeIT975 pointsBadges:
  • Client Loves User-Level Security, But Needs Access 2007

    Hey Guys, I have a Client for whom I have remodeled an access database. The database was initially created in Access 2003, and has been updated in 2007, though it is still in .mdb format. I showed the client a few simple user-level security options, and they worked like a charm. The only problem is...

    Washkuhnw90 pointsBadges:
  • Block MAC Address on Cisco Aironet 1260 Router

    How can I block one mac address from connecting to my Cisco Aironet 1260 Series router? We have open access but one client is being troublesome. Can this be done from the router or is it supposed to be done via the PIX firewall?

    JimmyIT1,725 pointsBadges:
  • Protecting GE links

     I have two different GE links in DWDMs . I have a 8 port GE lan switch in both ends. How I can protect my GE link of my customer?

    Pathu5 pointsBadges:
  • Database Security: SQL Server 2005 security login

    Like Oracle Logins how can we create Logins in Sql Server 2005? Please help me..........

  • Making a secure FTP or sFTP server

    I am running an ftp server on my windows 2008 server. How can I make it a secure ftp or sftp server? What kind of client do I need to retrieve files from it? Does this work out of the box?

    ITKE347,785 pointsBadges:
  • Inter Vlan Routing

    Hello. I have 5 vlans working on my network i.e 192.168.80.0, 81.0, 82.0, 83.0, 84.0, 85.0 . i have one core switch where all L2 switches are connected. and router is connected with L2 switch. caz its in another building so cant connect with L3 3750 switch. and i have configured 5 subinterfaces in...

    Dave5305 pointsBadges:
  • Answer a Question, Get A Practical Guide to Linux!

    This week's IT book giveaway is A Practical Guide to Linux Commands, Editors, and Shell Programming. Answer one of five unanswered questions then leave a link to your answer in the discussion area below. On Friday, August 20, 2010 at 12 PM ET, we'll choose a winner from those who answer. Ready,...

    MelanieYarbrough6,345 pointsBadges:
  • Which tool is used to configure 50 pix firewall?

    i have 50 pix firewall and how will i configure these firewall.

    Cybersoni5 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following