My computer is loged with unknown password how can i un lock it
Answer Question | September 21, 2011 10:59 PM
Endpoint security, Login, Login password, Password
I am working on .net windows application (Document Management System). In this application i am working with files and folders. and i want to use Encrypted file structure,Encrypted folder structure and Facility to store documents anywhere. Any Idea?
Answer Question | February 20, 2009 10:33 AM
.NET, .NET applications, .NET development, .NET Windows Application, Document management, Encrypting File System
One of my friends’ computer has believed to be infected by a virus. Whenever he put memory stick to the computer, following files appeared in the stick : 1)autorun.inf 2)squxe.exe 3)xnvjmz.exe These files can be deleted manually. But when he put that memory stick or other stick, the files appeared again in the stick. It [...]
Answer Question | January 30, 2012 8:17 AM
Antivirus, Symantec AntiVirus, Thumb drive, virus, Virus detection, Virus removal
I have a IBM, Thinkpad T-22 with Windows XP. When I boot the computer a black screen comes up and asked for a password. I have taken that hard drive out and put it into another computer and the samething happens. Correct me if I am wrong but, I believe that the hard drive has [...]
Answer Question | February 20, 2009 7:44 AM
Authentication, BIOS password, IBM T22 Thinkpad, Password, Windows XP
blocking chatenabled.mail.google.com doesn’t seem to work anymore. please help!
Answer Question | August 19, 2010 1:55 AM
Firewalls, FortiGate, FortiGuard, Google Talk, IM security, Unified Threat Management, UTM
I have a Cisco ASA5520, i create a backup configuration using the ASDM, but I can’t restore the configuration because the option to restore does not appear, how can I restore the configuration I save??
Answer Question | July 17, 2009 3:40 PM
ASDM, Cisco ASA, Cisco ASA 5520, Cisco ASA Backup, Cisco ASA Backup & Restore
A user recently asked this question via e-mail: I want to design a network, the specification is given below. Can you help me in this regard. Specification are 1) We have 7 site. 2) Each site have about 250 user and site one have 500 users 3) Exchange server, Mail server should be located at [...]
Answer Question | February 20, 2009 2:24 PM
ADSL, Cisco Routers, Exchange Server, ISA Server, Network design, VPN, VPN connectivity
Buffer length more than record for member
Answer Question | February 19, 2009 4:17 AM
I am having an issue where a Cisco ASA configured with WebVPN (Clientless SSL) user access. Connection via NT domain authentication is successful, and it is possible to browse a CIFS share, however randomly (4 secs to about a minute) the session is terminated with an idle timeout message. I have captured a debug on [...]
Answer Question | February 25, 2009 10:58 PM
Cisco 5520 configuration, Cisco Adaptive Security Appliance, Cisco ASA 5520, Cisco WebVPN, Clientless SSL VPN, Firewall configuration, Firewalls, Network connectivity, Remote access, SSL
is there any option to protect my folders in windows vista where i can use the password option.
Answer Question | November 19, 2010 3:17 PM
Folder permissions, Vista, Vista Password Protection, Vista Security
hello, i use Win XP Pro SP2. i have user in administrator group, but i want to disable this user change desktop properties. how can i do it? thanks.
Answer Question | February 19, 2009 8:33 AM
Administrative privileges, Local Administrator Rights, User groups, User Permissions, Windows XP, Windows XP user permissions
I would like to configure password less authentication for my user id, so that I don’t have type password when I logon using rsh to this server sing my ID.
Answer Question | February 17, 2009 6:56 AM
Authentication, Command line tools, Linux servers, Logon, Remote Shell, User authentication
I have recieved alive CD of Ubuntu. I am part of a LAN having NW components(Hub, Switcg etc) including Exch Server. Do I have to tell NW administrator before installing it? Does my user acct required changes in setting? Do I have to create a saprate drive to instal it? what about my existing OS [...]
Answer Question | February 17, 2009 5:41 AM
Dual booting, Linux installation, OS installation, Security policies, Ubuntu 8.04, User Permissions
We are planning to have a shutdown of power at data center to upgrade electrical power feeder. In doing so, we need to know the checklist to ensure risks associated during the initiative are minimized and controlled. We have hundreds of servers located at the data center that store appls and databases.
Answer Question | February 17, 2009 3:12 AM
Data center maintenance, Data center operations, Data Center power management, Risk assessment, Risk management
My company plan to roll out a policy on USB port control. I need guide to draft the policy.
Answer Question | February 18, 2009 2:01 AM
Endpoint security, Policies, Risk management, Security policies, USB, USB port security
A compliance officer in Europe could use some advice from fellow IT professionals and executives. His IT budget is being scrutinized, as is the case in every organization in 2009; he needs targets to get things done more efficiently but without taking on more risk. His department is evaluating benchmarking IT application controls as a [...]
Answer Question | March 23, 2009 6:04 PM
COBIT, Compliance, IT Compliance, regulatory compliance, Risk assessment, Risk management
ldap newbie here, tia for assistance want to use one repository (like AD) for authentication yet reference another repository (Sun One) for authorization to applications <since AD doesn’t support multiple groups/roles/schema changes well>. example So for application A, want to have the userID/pw authentication use AD, but for authorization to appl A, B, C, want [...]
Answer Question | February 16, 2009 2:28 PM
Exchange security, LDAP, LDAP hidden contacts, Security protocols
how to block particular sites of clients in server 2003
Answer Question | February 18, 2009 9:40 AM
Internet access, Internet restrictions, User Permissions, User restrictions, Windows Server 2003, Windows Server 2003 administration
Hi. Is citrix based solution the best for remote working by employees in terms of information security.Are there any solutions which offer better infosec protection especially to prevent copying of data from screen shots
Answer Question | February 19, 2009 7:33 AM
Citrix, Remote access security, Remote desktop, Remote desktop management, Remote management, Remote users, Remote workers, Security policies
I’m having problems coming up with the right Exchange SMTP Virtual Server and SMTP connector configuration for our network, after we decom two of our Borderware routers. I’ll try to explain it as simple as possible: - We have all our internal email filtered, and this will be sent to an Exchange server in our [...]
Answer Question | March 2, 2010 2:31 AM
Bridgehead Server, DMZ SMTP, Exchange 2003, Exchange 2003 administration, SMTP, SMTP connector, SMTP Virtual Server, Transport Layer Security