• Security policy for decommissioning printers & copiers

    We are about to scrap several old copy machines. I know they have hard drives in them. Should they be removed, wiped or what are normal company procedures for destroying any potential data on it before decommissioning it.

    Karl Gechlik9,860 pointsBadges:
  • View open applications and see which one has focus on a workstation.

    Can we see what open applications are open on domain workstations and what the computers focus is on? How can we do this?

    Karl Gechlik9,860 pointsBadges:
  • Bridging or bonding ethernet & firewalls from separate carriers

    We have two 10 MBit internet connections. They are both Ethernet handoffs and enter two different sonicwall firewalls. Is there a way to bridge or bond these two separate lines? They are from two separate carriers and have separate IP ranges.

    Troubleshooter24755 pointsBadges:
  • How can I stop a ddos attack without changing my IP addresses?

    We have about 10 IP addresses trying to cause a DDOS attack on our organization. As soon as I block the addresses in the firewall another batch takes its place. This has been ongoing for about 10 hours. How can I stop this attack without changing my IP addresses?

    Karl Gechlik9,860 pointsBadges:
  • Does Windows Server 2003 SP2 turn on Firewalls?

    All of our windows firewalls are off by group policy. I have read that the windows 2003 sp 2 turns it on anyway. Is this true and if so how can I prevent it? Or do I need to do the updates offline and turn it off manually?

    ITKE350,945 pointsBadges:
  • windows password question

    I recently purchased a computer from a "going out of business" sale for my fathers business and when I try to logon to Windows I get the logon screen with domain. I have a valid username and password but obviously i am not connected to a domain. I need to bypass this if possible. The safe mode...

    Minxcomp10 pointsBadges:
  • cmos bypass

    how can i by pass cmos password for my dell

    Edd3165 pointsBadges:
  • Anyone preparing for the CompTIA Security+ exam?

    In honor of security month here at IT Knowledge Exchange, we're giving away resources to help you pass the CompTIA Security+ exam with flying colors! What do you have to do to get this great resource? All you need to do is ask or answer two Security in 2010 questions*. Put the links to the...

    MelanieYarbrough6,345 pointsBadges:
  • Have you tried Microsoft Security Essentials?

    Microsoft Security Essentials was released last week -- have you tested it? Are you planning on implementing it? If not, what antivirus/antimalware package do you use?

    JennyMack4,280 pointsBadges:
  • How was my Windows Server 2000 terminal server hacked?

    1. We are running a terminal server on a Windows 2000 server. It has IIS on it. Someone was able to connect to the system, install some sort of SQL exploit tool as well as a mail blaster. How did this happen and how can we prevent it from happening again?

    Karl Gechlik9,860 pointsBadges:
  • Scanning network packets on Windows server 2003

    We need to capture network packets for analysis on our Windows server 2003. How can we achieve this and is there a guide to analyzing this data?

    TeachMeIT975 pointsBadges:
  • Audit Question on Periodic System Review

    Hello, I am auditing a client and would like to understand if there is any risk with the following scenario. We are auditing the periodic review of system privilege for payroll/HR system. The review is only done by one individual. This individual is the system owner and the system administrator. I...

    Toosunneo70 pointsBadges:
  • Adding domain to EPO server

    We have about 50 computers that already have Macfee 8.7 on them. We just installed an EPO server to manage all of our antvirus clients. How can we add the existing computers and the rest of the domain to the EPO server?

    Troubleshooter24755 pointsBadges:
  • Live Data Security Webinar with Imperva – Today at 2pm EDT (sponsor post)

    Join Imperva CTO, Amichai Shulman as he details the findings from one of the most comprehensive data security studies, which surveyed nearly 1000 security and IT professionals. This webinar provides: Best practices for compliance and data breach preventionAn overview of the most commonly used data...

    EmNichs3,250 pointsBadges:
  • Extended Access list for two routers in the network

    Hi, I would like to implement an extendard access-list on a router A which allows IP access to a host in router B. e.g. host A from network A can only access host B fom network B. No one else can access host A from the network except host B -vicer versa- I woul like to implement this access-list...

    Accesslist5 pointsBadges:
  • SQL 2005 keeps rebooting

    My SQL 2005 server keeps rebooting. I can not figure out why. I get an NT SUbsystem message and then a 30 second countdown. This happens 20-40 times in a day. How can I fix it? I can not even run a virus scan to completion. Windows server 2008 SQL 2005. McAfee 8.7.1.

    Troubleshooter24755 pointsBadges:
  • Help exporting database from Open Office to printer

      Greetings All:   I have a quandary with Open Office.  I am trying to get a small contact database to print labels.  I have tried to export the data, and found no way to create a template using Avery 5160 labels and import data to the template.  No can do.     It appears that through...

    Ericfr5 pointsBadges:
  • Open IT Forum: What security-related lessons have you learned?

    What is the hardest or most costly (whether it be time, money or pride) lesson you or your company has learned regarding security? We want to hear your security-related stories, concerns and blunders in the discussion area. The most entertaining or insightful stories have 200 knowledge points...

    MelanieYarbrough6,345 pointsBadges:
  • Sponsor Post: Live Data Security Webinar with Imperva – 9.15.2010

    Data Security: The New Paradigm in Info Security Wednesday, September 15, 2010 @ 2:00 pm EDT (New York, GMT-04:00) One major challenge in data security is the lack of awareness into which controls improve security outcomes. Typically, security controls are chosen based on anecdotes, personal...

    ITKE350,945 pointsBadges:
  • how to start ILM server

    please tell me the procedure of starting ILM sevesies in informatica???

    A285 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following