• Limiting User Abilities

    We have an administrator here that we are trying to limit access on and I wanted to know if anyone else has solved this issue. I spoke with IBM and we have restricted the access to ADDUSRPRF and DLTUSRPRF commands and we have also restricted access to certain user profiles like QSECOFR and QSYSOPR....

    Rayne42710 pointsBadges:
  • Changing to only one DHCP server and the other to a failover

    If we have two offices connected via sonicwall vpn how can we make it so we only need one dhcp server and it can fail over to the other one if necessary?

    Troubleshooter24755 pointsBadges:
  • Authorization problem on DDM file in RPG program

    I have a RPG program that accesses three DDM files on another iSeries. The program compiles, but I receive error CPF9822-Not authorized to file XXXX in library XXXX. Cannot open DDM file. I have *SECOFR rights on both machines. Can someone help me?

    Freckles0 pointsBadges:
  • Enabling QOS on Windows Server 2003 network

    How do I enable QOS on my network as we are introducing soft phones and IP phones to our network? The network has Windows 2003 servers, a sonicwall FW and a cisco router.

    Karl Gechlik9,860 pointsBadges:
  • Best enterprise level wireless device?

    What is the best enterprise level wireless device? We have been looking at cisco and sonicwall. What would you recommend to serve up wireless connections for about 3000 users across a 300 acre spot? We want to blanket the community in wifi and have access available everywhere. If there are low...

    ITKE352,395 pointsBadges:
  • Checking when PIX/ASA rules were accessed on a PIX 515e

    I'm a recent hire, and now I've been asked to clean up our PIX/ASA rules. Aside from the show access-list, is there a command  that can help me determine the last time the rule was accessed? Any other tips when cleaning up rule clutter?

    ITKE352,395 pointsBadges:
  • computer associates registry settings

    i need to find the registry key that tracks the anti-virus update date for computer associates software version 8.1

    Breyn5 pointsBadges:
  • Updating data to 3rd party without jeopardizing Lotus Notes security

    Hi, My team and I are stuck. A 3rd party needs access to certain information on our Lotus Notes database about clients status and we are unsure on how to go about this without jeapodising security and firewalls. We've thought of a web based application for the 3rd party however how will we send...

    Bukhosi5 pointsBadges:
  • Security, perceived threats.

    Could the more recent predictions about targeted attacks moving from attention to pay-off be actually because after the industry was starting to take the subject more seriously than lip-service, had the effect of eliminating the noise so that now we can hear the state sposored pin drop?

    Papp310 pointsBadges:
  • Windows 7 antivirus to prevent access

    Can the Windows 7 antivirus integrate into the system to block internet or network access upon detecting a virus or threat that could not be contained?

    Troubleshooter24755 pointsBadges:
  • FingerPrint matching

    where to find a good and simple explanation about fingerprint matching algorithms and techniques?

    SYR5 pointsBadges:
  • Unauthorize Volume shadow copy client access by Windows XP Pro Client

    How to prevent unauthorize access by Windows XP Pro (SP2) client station to the Volume shadow Copy service of the Server running Server 2003 software. The client station have not been loaded with the "Shadow Copy Client" software, yet they can see the previous version tab when they click on the...

    Vhocon0 pointsBadges:
  • Auditing User Access in AS/400

    I am trying to figure out how to audit user access at the record level. In the Audit Journal the entry types ZC and ZR tell me at the file level who has opened a file for Change or Read. In the Journal, the Journal code of R along with the type code will give me information on who has added,...

    wpoulin2,480 pointsBadges:
  • We’ll trade you an Xbox 360 for your knowledge!

    The holidays are approaching and so is your next chance to win an Xbox 360 by simply doing what you do around IT Knowledge Exchange. Between today and December 15th, the three members who accumulate the most knowledge points will win some great prizes:   1st Prize: Xbox 360 with 250GB hard drive &...

    MelanieYarbrough6,345 pointsBadges:
  • Basic salary for information security careers

    I am plannig to lerarn MCITP, RHCE, CCNA. What will be the basic salary for the fresher in this field.

    Ciscotraining5 pointsBadges:
  • Roaming Windows Profile Issues

    I support an application that gives users several preferences to choose from. These are written to the Windows registry in the CurrentUser directory. Is there a way to implement or save these settings for a roaming user profile in Windows? Normally I would just export and import the registry for...

    Techy1984225 pointsBadges:
  • SAVACTWAIT time on SAVLIB, etc.

    Hi, Has anyone experimented with the SAVACTWAIT time on the SAVLIB command. The default on 120 second seems rather long. What I am looking for is a realistic value based on fact such as that if an object does not become available after 5 second the change that it will become available after 120...

    JohnDavid5 pointsBadges:
  • 3rd party connectivity to SQL server through firewall

    We need to allow a third party to connect to one of the SQL servers in our DMZ via an externally initiated SQL connection. What is the best approach and what are the risks?

    Patch0115 pointsBadges:
  • Windows-based software for PC monitoring

    I need a windows based tool with which i can monitor indviual user pc and receive log on my id.

    ninjas180 pointsBadges:
  • How to begin attempting to build and sustain security for our information assets?

    I recently learned about SKiP, Security Knowledge in Practice, in one of my classes at UAT and I am very intrigued by it.  I did not realize that the problem-based approach was the common.  I guess that is one of the great advantages of SKiP, being a process-based approach to organize and...

    JJUAT5 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following