• Network Resource Allocation cum Planning cum Technical Problem

    This is the real commercial problem face by my company. Well, the reason I ask this problem is I salute and respect all of you as I believe all of you are as good as network solution company out there, or even better!! Lets me rephrase the entire problem again. Company expand so fast that the IT...

    Hunkgym5 pointsBadges:
  • Design NEW network cum NEW IT infrastructure-2

    Company expand so fast that the IT infrastructure is not fast enough to cater high volume of traffic; the initial design is not scalable. The number of new branch offices setup caused the company pay a high price in the leased line communication. Salesman and management staffs dial into company...

    Hunkgym5 pointsBadges:
  • Design NEW network cum NEW IT infrastructure

    Company expand so fast that the IT infrastructure is not fast enough to cater high volume of traffic; the initial design is not scalable. The number of new branch offices setup caused the company pay a high price in the leased line communication. Salesman and management staffs dial into company...

    Hunkgym5 pointsBadges:
  • What is SSI injection

    I recently read an article that mentioned SSI injection. I'm aware of SQL injection, but not SSI. Can anyone explain what it is and what should be done to protect against it? Thanks

    Coder6270 pointsBadges:
  • Laptop Security (Remotely)

    Hi, I am an Information Security Consultant. We want to monitor all activities done by Laptop Users when they are working offline. Can somebody suggest a tool which can push all logs on server while a user is working offline. We have banned USB sticks in our office and also all email activity is...

    Tarang0 pointsBadges:
  • route mail with fax service in sbs 2003

    i have a sbs 2003 on my network and i configure him to get all the fax of my company, the only problem is that when i configure him to route all the incoming fax to some mail it does not seem to work, i check the event log and i get error 32083 and with this massage: Unable to route fax C:Documents...

    Drorbenyosef5 pointsBadges:
  • Blocking music on internet connection

    Hi all, I have some internet users who listen to online radio stations. I have asked them not to do it, as I feel like it probably uses up a fair amount of bandwidth. Is this correct, or does it use very little? Also, other than purchasing and installing software, is there a way to block music?...

    TheVyrys0 pointsBadges:
  • Connection Management

    Hello, I am working on a project that we have a deployed a Personal Firewall product on laptop users. The Personal Firewall allows us to define a server based access profile or FW rules for each type of connection and IP range. ie. Ethernet, WLAN etc. The issue is this personal FW activates BOTH...

    Mkimonos0 pointsBadges:
  • Folder Security

    We have a folder containing lots of confidential docs that supposedly accessible to all employees that should have read permission only. They should not be able to Print/Copy/SaveAs/E-Mail and do other docs stuff. Our IT staff had made the folder read only though people could still re-save the...

    ALVXSE870 pointsBadges:
  • Penetration Testing Career

    Hi Friends I want an advice from you guys. I have work exp in Web Developement and Quality Assurance. But my interest lies in security and penetration testing. Could you guys guide me where to start from. If there is any good material which can help me doing the same or some site where I can...

    DrDevil0 pointsBadges:
  • Explanation & remedy for Web-based Attack

    Fully Patched fresh Windows 2003 with PLESK 7.5.6 Compromised again in 30 minutes after a CLEAN rebuild here is How attack occurs ========================== first we observe service.dll Nadeware.msi in system32 folder and a clone of srv-u FTP had run. then we observe an account named help added to...

    Aalborz0 pointsBadges:
  • Blocking Music on Internet connection

    Hi all, I have some internet users who listen to online radio stations. I have asked them not to do it, as I feel like it probably uses up a fair amount of bandwidth. Is this correct, or does is use very little? Also, other than purchasing and installing software, is there a way to block music?...

    TheVyrys0 pointsBadges:
  • Fixing violation errors found with CHKOBJITG

    I have just begun running the command to check object itegrity on my system. I have encountered 2 basic errors - BADSIG & ALTERED. Can you please explain how I now correct these errors? The objects are basic IBM supplied code (i.e. ADDTCPLNK in QTCP library). I have no idea how these objects were...

    CMHIT10 pointsBadges:
  • Virus scanning the iSeries IFS

    Do you know of any products that will allow me to scan my IFS for viruses? If so, are you using the product(s) and are you satisfied with their performance? THANKS! for your help.

    CMHIT10 pointsBadges:
  • In VPN Which protocol to be used……??

    Hiiiii everybody..... I am Bala new member of this group I have got one small querry regarding VPN, in my organization i am trying to implement VPN for the remote access, in the bangalore office i wanted to install concentrator Cisco 3015 and in the bombay and pune office i wanted to configure VPN...

    Balasaheb0 pointsBadges:
  • Exam question Antivirus – VPN – related

    Hi I would like to offer a sincere thank you for reading this far. Im in deep trouble and need to answer a theory question for a presentation and would really appreciate any thoughts you can offer me. I only have the below information to go on and need to explain and present a soultion for the...

    Sprogg20010 pointsBadges:
  • Symantec Resources

    Our company has just partnered with Symantec and being new to their products, I'm finding myself a bit overwhelmed. Are there any websites that offer mailing lists or online forums that can help with some of the issues I'm running into? This seems like an interesting concept for user-to-user...

    SMSMVP0 pointsBadges:
  • Digital Certificates-2

    Under what circumstances may an organisation decide to have its own Certification Authority(CA) rather than purchasing certificates from a commercial CA and its implications? Thanks in Advance

    Homestead0 pointsBadges:
  • Looking for good HIP.

    Hi, I am looking for a good Host-based Intrusion Prevention System to be implemented on Intel Servers in my Company. Is there anything you would recommend...?

    JakubK0 pointsBadges:
  • Loadsharing between two ISPs

    dear sir, I am looking for a load sharing solution between 2 leased lines for 2 different ISPs the diagram goes lke this: LAN-->Cisco Pix-->Router-->2 leased lines. can load-sharing be done at the router without extra configuration at the providers side? can CEF (cisco express forwarding)...

    SkullyMJ0 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following