• user password auditing

    We have recently purchased LC5 to perform password audits to discover weak passwords. The documentation indicates to use PWDUMP3 to extract password hashes from the Active Directory. I have looked everywhere and cannot find a legitimate site to download this tool nor can I find documentation. Has...

    INSANEIT0 pointsBadges:
  • Windows 2000 / 2003 Server Log Management

    Hi All, I am an IT Security Administrator of my company. i need to audit more than 100 Windows servers for systems logs, event logs , anti virus server logs almost every month. I am looking out for automated tools that can help me make my work easier. A product with a good reporting tool will be...

    Tarang0 pointsBadges:
  • how can an application disable/enable a user account in active directory??

    How can a fingerprint reader be used to disable/enable a user account?? Could I use a VBscript to do this?

    0JeanLuc00 pointsBadges:
  • Prefferred Anti Virus Program?

    Hi All, Can i get any suggestions on what you consider being the BEST Anti virus software with not much hassles! The 2 i`m most interested in is Norton and Mcafee? Any 3rd party app will also be greatly appreciated! I had Norton 2005 Internet Security on my PC,1.7GHZ AMD,Win XP SP2, 384MG RAM and...

    Wazzup0 pointsBadges:
  • ECPI college…good or bad

    Good Evening: I've recently completed 8 years in the US Navy and I'm looking to complete my degree and I see a lot of talk about ECPI college. It's a technical college but it's a 2-year degree. I'm looking to get into computer network design and computer science and I'm wondering if ECPI or any...

    TripleHHH0 pointsBadges:
  • ECPI college…good or bad-2

    Good Evening: I've recently completed 8 years in the US Navy and I'm looking to complete my degree and I see a lot of talk about ECPI college. It's a technical college but it's a 2-year degree. I'm looking to get into computer network design, internet security and computer science and I'm wondering...

    TripleHHH0 pointsBadges:
  • Pix Firewall and Proxy Server

    I need to allow only one IP address (the one for proxy server) to browse through Pix firewall to Internet. What will be the commands in PIX firewall to block the traffic to Internet from all the network 10.2.1.x but only allow 10.2.1.10 (Proxy server). All other computers will use proxy server...

    EngineerIT0 pointsBadges:
  • Windows 2000 Server logs

    Hi All, Basically i want to monitor all the activities of my administrators. Is there any way I can find out all the activities on a Windows 2000 Server eg:- success / failure logs ,which users had logged on to a server , user creation time ,service stopped at what time, what scripts have been...

    Tarang0 pointsBadges:
  • Associating MS Certificates w/ handwritten signatures

    Does anyone know if it is possible to associate a Microsoft PKI/Certificate to a signature image (handwritting) so that a document/email can be signed (digitally) but will also have an image of the associated handwritten signature embedded within the document (and secured)? I know more advanced...

    Michael7110 pointsBadges:
  • Using client certificates with Cisco VPN 3xxx concentrator

    I am specifically looking for a way to match Windows loging credentials with a user certificate and then transparently submit to Active Directory for authentication. It seems that the Cisco VPN client first checks the validity of the certificate (without matching the Windows credentials) then...

    Stuberman0 pointsBadges:
  • IT Security

    Hi all, Thanks to all those who answered to my question"FTP sites" Can anyone of you let me know about the available products that we can use for our organisations IT security..Also let me know what products are available to find out vulnerabilities in a network. Appreciate your response. Thanks...

    Tarang0 pointsBadges:
  • Need guidiance from pros already into the game

    Hi, I am a United Stated Marine stationed overseas since 2003, majoring in Information technology with National University. I am still an idiot in the field and thats why i joined this group. To get a glance of what to ecpect in the future. I am asking for your help in guiding me through whatever...

    Foguno0 pointsBadges:
  • Local Admin & passwords

    We have recently switched to allowing only Power User rights on notebook computers. We have a set of notebooks we loan out to employees with desktops when they need to travel. Currently those users will login with an account named loaner and use scripts and webmail to access the network. Discussion...

    Roced40 pointsBadges:
  • aaa authorization ?

    Which of the following authorization commands are valid? (we have to choose 2 correct) A. aaa authentication exec home radius B. aaa accounting exec home radius C. aaa authorization default none D. aaa authorization exec home radius E. aaa authorization network default enable F. aaa authorization...

    EngineerIT0 pointsBadges:
  • IM Blocking and URL Filtering

    We have Pix515E which is gateway to Internet. We also got IWSS Proxy(Trend Micro) along with URL filtering module. Domain users get directed to IWSS proxy (GPO settings) and restrictions about URL filterings can be imposed as per company's policy. Those users who are not on the domain, they can not...

    EngineerIT0 pointsBadges:
  • LDAP in DMZ

    We are using LDAP for Internal environment as an Enterprise directory having lot of application and user specific data. There is requirement to access LDAP from external network also. Bearing that in mind we shall have LDAP Server in DMZ to service external applications. Here we are using Sun...

    PankajAnand0 pointsBadges:
  • Sendig Mail to user@IP

    We have two Mx Record (same ISP) pointing to the same mail server. The Mail Server is REDHAT Linux. I want to send a mail to user@ip address (first or second Mx Record). This is basically to test if first Mx record fails, will the second record be used. I would be sending this mail from the LAN to...

    Jagdish60 pointsBadges:
  • expired credentials in Windows XP

    We have one particular XP-Pro system that repeatedly throughout the day (5-6 times) will ank the user for their credentials again. After entering them will continue just fine. This is the only system doing this and is pretty annoying. Why is this happening?

    Bugwit0 pointsBadges:
  • problem with exchange sync and pocket pc 2003

    i have a HP iPAQ hx4700 with Pocket PC 2003 on it that connect to the internet through my phone cellolar (with bluethooth connection), i want to sync all my contact and my calender on my ipaq to my exchange small buisness server 2003 through the internet,my server connect to the internet and are...

    Drorbenyosef5 pointsBadges:
  • ping from outside

    hi, could you please tell me which command in cisco routers prevent them from being ping from outside networks. and also how can i prevent terminals inside a network to ping outside ips(group policies etc??). thanks

    Redrose0 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following