• Port 1894

    Hi, Our port scanner has detected '1894' as an open port. We know 1894 is an 'O2Server' port. Could you please throw some light on the port '1894'? Thanks kbs

    Hellokbs0 pointsBadges:
  • Laptop Security…

    Hi, I am the head of my department and by the nature of the job I hold some confidential information on my laptop. How do I ensure that 1. Nobody can access any files on my laptop from the LAN or the internet (not even sys admins) 2. If somebody tries to access, can I find out /trace who it is or...

    Blackmagic0 pointsBadges:
  • runnunig application from the web….

    Hi, I have an application server that is in my network and is a stand alone server,and I have ISA server 2004 in my domain with an valid IP address. Which access rule I should add to Isa that some external users can running application from the interner by typing our valid ip addressApplication...

    Aliyani265 pointsBadges:
  • strange processes showing up in the task list some random numbers.TMP

    I suspect I have some trojan downloader? I keep finding strange processes showing up in the task list. These are some random numbers and letters with a .TMP extension? They cause my internet connection to either run very slow or in most cases it stops the connection to the internet. When I kill the...

    BigDInfla0 pointsBadges:
  • Local LAN Vulnerabilities and Open Ports NAT

    QUESTION: How someone would go about exploiting a vulnerability within a LAN sitting behind a router running NAT/NAPT...where would you start? Hacking the open port? Routing Tables? Accessing remote administration on the modem? (disable NAT)?? bah... MY SYSTEM/SETUP: I have 1 XP SP2 Machine running...

    Ladrick0 pointsBadges:
  • LAN vulnerability behind a Router – with firewall – connected to the Ineternet (Through an Open Port!)

    Hi, I would just like some reassurance: I have a Router on my LAN that connects all host PCs to each other and the internet. Qu: How exposed is my LAN behaind the Router that has a port open for internet access (and in future anther for remote desktop terminal connection) would a port scanner see...

    ToneEzeeJ0 pointsBadges:
  • Network Resource Allocation cum Planning cum Technical Problem

    This is the real commercial problem face by my company. Well, the reason I ask this problem is I salute and respect all of you as I believe all of you are as good as network solution company out there, or even better!! Lets me rephrase the entire problem again. Company expand so fast that the IT...

    Hunkgym5 pointsBadges:
  • Design NEW network cum NEW IT infrastructure-2

    Company expand so fast that the IT infrastructure is not fast enough to cater high volume of traffic; the initial design is not scalable. The number of new branch offices setup caused the company pay a high price in the leased line communication. Salesman and management staffs dial into company...

    Hunkgym5 pointsBadges:
  • Design NEW network cum NEW IT infrastructure

    Company expand so fast that the IT infrastructure is not fast enough to cater high volume of traffic; the initial design is not scalable. The number of new branch offices setup caused the company pay a high price in the leased line communication. Salesman and management staffs dial into company...

    Hunkgym5 pointsBadges:
  • LAN vulnerability behind a Router – with firewall – connected to the Internet (Through an Open Port!)

    Hi, I would just like some reassurance: I have a Router on my LAN that connects all host PCs to each other and the Internet. Question: a) How exposed is my LAN behind the Router that has a port open for Internet access (and in future anther for remote desktop terminal connection) would a port...

    ToneEzeeJ0 pointsBadges:
  • What is SSI injection

    I recently read an article that mentioned SSI injection. I'm aware of SQL injection, but not SSI. Can anyone explain what it is and what should be done to protect against it? Thanks

    Coder6270 pointsBadges:
  • Laptop Security (Remotely)

    Hi, I am an Information Security Consultant. We want to monitor all activities done by Laptop Users when they are working offline. Can somebody suggest a tool which can push all logs on server while a user is working offline. We have banned USB sticks in our office and also all email activity is...

    Tarang0 pointsBadges:
  • route mail with fax service in sbs 2003

    i have a sbs 2003 on my network and i configure him to get all the fax of my company, the only problem is that when i configure him to route all the incoming fax to some mail it does not seem to work, i check the event log and i get error 32083 and with this massage: Unable to route fax C:Documents...

    Drorbenyosef5 pointsBadges:
  • look fax in OWA

    i have a sbs 2003 and it connect to modem to get fax, and iv'e configured him to get users to outlook web access but i want to know if there is a way to see fax on the server from the owa? is there a way that user log on to owa and then can see new fax that arrived? (suppose that he had the...

    Drorbenyosef5 pointsBadges:
  • Blocking music on internet connection

    Hi all, I have some internet users who listen to online radio stations. I have asked them not to do it, as I feel like it probably uses up a fair amount of bandwidth. Is this correct, or does it use very little? Also, other than purchasing and installing software, is there a way to block music?...

    TheVyrys0 pointsBadges:
  • Connection Management

    Hello, I am working on a project that we have a deployed a Personal Firewall product on laptop users. The Personal Firewall allows us to define a server based access profile or FW rules for each type of connection and IP range. ie. Ethernet, WLAN etc. The issue is this personal FW activates BOTH...

    Mkimonos0 pointsBadges:
  • Blocking pop access over http

    Dear you, How can I exactly block the following: 1- Hotmail pop access over http 2- Block skype phone calls 3- Block sites like gotomypc.com etc 4- Block internet file share drives like yousendit.com google drive Thank you Kindi

    KindiA0 pointsBadges:
  • Explanation & remedy for Web-based Attack

    Fully Patched fresh Windows 2003 with PLESK 7.5.6 Compromised again in 30 minutes after a CLEAN rebuild here is How attack occurs ========================== first we observe service.dll Nadeware.msi in system32 folder and a clone of srv-u FTP had run. then we observe an account named help added to...

    Aalborz0 pointsBadges:
  • Dynamic Local User in W2K clients

    Hello. Does anyone have an idea on how to configure a Wondows 2000 client to show the SID of any user that logs in to that computer. We run a Novell Netware 6.5 network, and have about 60 W2K clients. I have a generic local account for the W2K stations. When a user logs in, it does not record the...

    Onezorro0 pointsBadges:
  • Blocking Music on Internet connection

    Hi all, I have some internet users who listen to online radio stations. I have asked them not to do it, as I feel like it probably uses up a fair amount of bandwidth. Is this correct, or does is use very little? Also, other than purchasing and installing software, is there a way to block music?...

    TheVyrys0 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following