• Connection Management

    Hello, I am working on a project that we have a deployed a Personal Firewall product on laptop users. The Personal Firewall allows us to define a server based access profile or FW rules for each type of connection and IP range. ie. Ethernet, WLAN etc. The issue is this personal FW activates BOTH...

    Mkimonos0 pointsBadges:
  • Blocking pop access over http

    Dear you, How can I exactly block the following: 1- Hotmail pop access over http 2- Block skype phone calls 3- Block sites like gotomypc.com etc 4- Block internet file share drives like yousendit.com google drive Thank you Kindi

    KindiA0 pointsBadges:
  • Explanation & remedy for Web-based Attack

    Fully Patched fresh Windows 2003 with PLESK 7.5.6 Compromised again in 30 minutes after a CLEAN rebuild here is How attack occurs ========================== first we observe service.dll Nadeware.msi in system32 folder and a clone of srv-u FTP had run. then we observe an account named help added to...

    Aalborz0 pointsBadges:
  • Dynamic Local User in W2K clients

    Hello. Does anyone have an idea on how to configure a Wondows 2000 client to show the SID of any user that logs in to that computer. We run a Novell Netware 6.5 network, and have about 60 W2K clients. I have a generic local account for the W2K stations. When a user logs in, it does not record the...

    Onezorro0 pointsBadges:
  • Blocking Music on Internet connection

    Hi all, I have some internet users who listen to online radio stations. I have asked them not to do it, as I feel like it probably uses up a fair amount of bandwidth. Is this correct, or does is use very little? Also, other than purchasing and installing software, is there a way to block music?...

    TheVyrys0 pointsBadges:
  • Allowing IE to Install Selected Software

    When restricting users to non-Power Users settings, how do we allow a Web Browser Front End to an application to download and install: a) Active X-Controls b) Files c) Registry Keys. I assume that there are settings we can make via GPO?

    Mattblack0 pointsBadges:
  • Fixing violation errors found with CHKOBJITG

    I have just begun running the command to check object itegrity on my system. I have encountered 2 basic errors - BADSIG & ALTERED. Can you please explain how I now correct these errors? The objects are basic IBM supplied code (i.e. ADDTCPLNK in QTCP library). I have no idea how these objects were...

    CMHIT10 pointsBadges:
  • Terminal server installed on a WIndows 2000 DC – GPO question

    I have a Windows 2000 Domain controller with Terminal Server installed on it. I understand that running TS on a DC is not recommended, but I have to use what I have available. My question is how do I lockdown a user with a GPO when they log on remotely and not when they log in over the LAN. I would...

    Skepticals0 pointsBadges:
  • Limiting User rights to SQL Server from Web Service

    Hi folks I am in the early days of developing an app that has (I think) some unusual security requirements. It will be deployed eventually on an intranet. As an example, please see the following: There is a Clients table that everybody has access to. this will have the usual fields such as ID,...

    Rosspetersen5 pointsBadges:
  • In VPN Which protocol to be used……??

    Hiiiii everybody..... I am Bala new member of this group I have got one small querry regarding VPN, in my organization i am trying to implement VPN for the remote access, in the bangalore office i wanted to install concentrator Cisco 3015 and in the bombay and pune office i wanted to configure VPN...

    Balasaheb0 pointsBadges:
  • Exam question Antivirus – VPN – related

    Hi I would like to offer a sincere thank you for reading this far. Im in deep trouble and need to answer a theory question for a presentation and would really appreciate any thoughts you can offer me. I only have the below information to go on and need to explain and present a soultion for the...

    Sprogg20010 pointsBadges:
  • Symantec Resources

    Our company has just partnered with Symantec and being new to their products, I'm finding myself a bit overwhelmed. Are there any websites that offer mailing lists or online forums that can help with some of the issues I'm running into? This seems like an interesting concept for user-to-user...

    SMSMVP0 pointsBadges:
  • SFTP supporing FTP product

    We have some external contacts that continue to use FTP to our FTP server. Is there an SFTP product that would support FTP without changing out the client software? This server is running Windows 2003 Server. I understand there is also a way to have both FTP and SFTP running on the same server....

    SecureMax0 pointsBadges:
  • Digital Certificates-2

    Under what circumstances may an organisation decide to have its own Certification Authority(CA) rather than purchasing certificates from a commercial CA and its implications? Thanks in Advance

    Homestead0 pointsBadges:
  • Security Testing

    How do u use the 'whois' utility on a windows XP OS? Thanks.

    Homestead0 pointsBadges:
  • Loadsharing between two ISPs

    dear sir, I am looking for a load sharing solution between 2 leased lines for 2 different ISPs the diagram goes lke this: LAN-->Cisco Pix-->Router-->2 leased lines. can load-sharing be done at the router without extra configuration at the providers side? can CEF (cisco express forwarding)...

    SkullyMJ0 pointsBadges:
  • Digital Certificates

    Under what circumstances may an organisation decide to have its own Certification Authority(CA) rather than purchasing certificates from a commercial CA and its implications? Thanks in Advance

    Homestead0 pointsBadges:
  • AOL Spammer IP Identification

    Concerning the ever increasing amount of received spam, to battle this I have a program with which I can extract the IP address from the sender for reporting purposes, however, I have been receiving an increasing amount from AOL proxy server for which I cannot aquire the senders IP address. Is...

    Eyecatcher550 pointsBadges:
  • Hello

    New Discussion Post

    0 pointsBadges:
  • layer 2 & layer 3 switch

    Hi All, what is the basic difference between layer 2 & layer 3 switch. how can configure layer 2 & layer3 managable switch

    Psharma11760 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

Thanks! We'll email you when relevant content is added and updated.

Following