• Fixing violation errors found with CHKOBJITG

    I have just begun running the command to check object itegrity on my system. I have encountered 2 basic errors - BADSIG & ALTERED. Can you please explain how I now correct these errors? The objects are basic IBM supplied code (i.e. ADDTCPLNK in QTCP library). I have no idea how these objects were...

    CMHIT10 pointsBadges:
  • Virus scanning the iSeries IFS

    Do you know of any products that will allow me to scan my IFS for viruses? If so, are you using the product(s) and are you satisfied with their performance? THANKS! for your help.

    CMHIT10 pointsBadges:
  • In VPN Which protocol to be used……??

    Hiiiii everybody..... I am Bala new member of this group I have got one small querry regarding VPN, in my organization i am trying to implement VPN for the remote access, in the bangalore office i wanted to install concentrator Cisco 3015 and in the bombay and pune office i wanted to configure VPN...

    Balasaheb0 pointsBadges:
  • Exam question Antivirus – VPN – related

    Hi I would like to offer a sincere thank you for reading this far. Im in deep trouble and need to answer a theory question for a presentation and would really appreciate any thoughts you can offer me. I only have the below information to go on and need to explain and present a soultion for the...

    Sprogg20010 pointsBadges:
  • Symantec Resources

    Our company has just partnered with Symantec and being new to their products, I'm finding myself a bit overwhelmed. Are there any websites that offer mailing lists or online forums that can help with some of the issues I'm running into? This seems like an interesting concept for user-to-user...

    SMSMVP0 pointsBadges:
  • Digital Certificates-2

    Under what circumstances may an organisation decide to have its own Certification Authority(CA) rather than purchasing certificates from a commercial CA and its implications? Thanks in Advance

    Homestead0 pointsBadges:
  • Looking for good HIP.

    Hi, I am looking for a good Host-based Intrusion Prevention System to be implemented on Intel Servers in my Company. Is there anything you would recommend...?

    JakubK0 pointsBadges:
  • Loadsharing between two ISPs

    dear sir, I am looking for a load sharing solution between 2 leased lines for 2 different ISPs the diagram goes lke this: LAN-->Cisco Pix-->Router-->2 leased lines. can load-sharing be done at the router without extra configuration at the providers side? can CEF (cisco express forwarding)...

    SkullyMJ0 pointsBadges:
  • Digital Certificates

    Under what circumstances may an organisation decide to have its own Certification Authority(CA) rather than purchasing certificates from a commercial CA and its implications? Thanks in Advance

    Homestead0 pointsBadges:
  • Norton 10.0.1 Tamper Protection Uninstall

    I've looked everywhere and can't find how to get rid of tamper protection after a manual uninstall of the AV itself. Everytime I right mouse-click on the server it tries to reinstall itself, and gives an invalid msi no matter where I try to point it. It's driving me crazy. It's my fault that I did...

    BudLite0 pointsBadges:
  • need an outsourced managed security vendor

    Looking at a managed security service provider that can help with GLBA regulatory requirements

    Joseph340 pointsBadges:
  • Antivirus Renewal

    From time to time I have Customers who feel as though I am taking money out of their pocket by informing them that they need to update their Anti-Virus Subscription and/or their Security Subscription (ie SonicWall). Can someone provide me with supporting documentation that speaks specifically to...

    Coop20000 pointsBadges:
  • SPAM

    I am running Exchange 2003 and Win2k3 servers. we get a ton of spam, and I want to stop it. What in your opinion are the best SPAM softwares and why? (such as strong points and weak points) let's hear it....

    TheVyrys0 pointsBadges:
  • AOL Spammer IP Identification

    Concerning the ever increasing amount of received spam, to battle this I have a program with which I can extract the IP address from the sender for reporting purposes, however, I have been receiving an increasing amount from AOL proxy server for which I cannot aquire the senders IP address. Is...

    Eyecatcher550 pointsBadges:
  • layer 2 & layer 3 switch

    Hi All, what is the basic difference between layer 2 & layer 3 switch. how can configure layer 2 & layer3 managable switch

    Psharma11760 pointsBadges:
  • Cookies used by techtarget.com

    I would like to know why it is necessary that this site utilizes somany tracking cookies. i could not find in the faq/info area any mention of the fact that i would be infested with 5 or more tracking cookies when using this site.

    DBZinGermany0 pointsBadges:
  • E-mail filtering service thinks zip file is infected with W32/Bagle virus

    One of our employees is having difficulty receiving e-mails from a vendor. The vendor is zipping up two text files and e-mailing the zip file to us. The Zip file is identified as a virus by our on-line e-mail filtering service and the e-mail is deleted before it hits our mail server. If the vendor...

    DKoch675 pointsBadges:
  • Seeking SAP SEM configuration help

    Recently, Manish, a SearchSAP.com user, sent in the following question on SAP SEM. <p> "Apart from standard SAP help, does anyone know of a SEM-BCS step-wise configuration guide? <p> Is there anything I can order online? I want to start on SEM-BCS as soon as possible." <p> Do you...

    laurenhoyt115 pointsBadges:
  • Need Help – Netscreen 25 with Fortigate 60.

    Hi All. Good Morning & Greetings of the season. I recently joined this company as a Network Security Specialist & the 1st task that i got assigned to myself was this. We have 3 locations - A (India) - Indian Operations B (California) - US Operations C (Datacenter) - Web & Media Servers My network...

    Nileshroy0 pointsBadges:
  • user password auditing

    We have recently purchased LC5 to perform password audits to discover weak passwords. The documentation indicates to use PWDUMP3 to extract password hashes from the Active Directory. I have looked everywhere and cannot find a legitimate site to download this tool nor can I find documentation. Has...

    INSANEIT0 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following