-
Cannot get into EMC or ECS 2010
I installed Exchange 2010 and that seemed to go with out a hitch now I cannot get into the EMC or the shell to setup the server. I want to uninstall the server and reinstall but I cannot because it is a bridgehead to an older Exchange 2003 environment. Without the EMC or ECS working, how can you...
Last updated: -
Exchange 2003 internal network relay
I have an Exchange 2003 Server Standart with ISP in my Windows 2003 organization. When i try to relay internal mails from an application server, the SMTP relay fails. Is some specific configuration or permission required for relaying internal mail? OBS: - Only the options Anonymous access and...
Last updated: -
How can I see my attachments in its original format and not as a web mail?
Last updated: -
Send group invitation on Outlook 2010
I have a group list i made. But i keep getting an error that says "Only users with SMTP email addresses can be invited" Does anyone know what this means or why it is happening?
Last updated: -
Can I work with Exchange server without public IP? If yes, how?
Last updated: -
I can't get into my gmail account because I forgot the password. And to change it I need to put in the last password I remember, when I created it, and when the last time I logged into it was. I don't know any of those things. What can I do?
-
I have some question of Exchange Server 2010
1- What is connector in exchange server 2010 2- What is smart host and relay. 3- What are Recipient Policies in exchange server 2010. 4-What is Online and offline defragmentation. Please explain so that above queries will be cleared easily.
Last updated: -
MS Exchange POP3 Connector for SBS
I have configured a POP3 Connector in my SBS Exchange server. I believe if have the SMTP working, I can send and receive locally, and I can send to an external email address and it be delivered. What I can't do is receive an email from an external address. I can watch the inbox of where my pop3...
Last updated: -
Free IT Book: AAA Identity Management Security
This week's free IT book is your complete, authoritative guide to implementing, configuring, and managing AAA with CiscoSecure ACS. For a chance to win AAA Identity Management Security, answer one of the questions listed below and post the link to your answer in the discussion section of this...
Last updated: -
Outlook web Access (OWA) security concerns
Hi, I'm trying to convince my boss that our organization can provide access to e-mail over the internet without security threats. I plan to use OWA. So, can you tell me the risks and the counter measures?
Last updated: -
Free IT Book: CompTIA Security+ Certification Passport
This week's free IT book is Mike Meyers' CompTIA Security+ Certification Passport: Revised for the new CompTIA Security+ exam (SY0-301). The new edition provides a condensed and concise review of CompTIA’s well-established security credential. For a chance to win this quick review, cram-style...
Last updated: -
Security/ Audit Check list for DB2
Hi, I'm in the process of hardening the DB2 in Linux and I'm looking for a checklist to help me make sure I don't miss anypoint. Since I'm not an expert on DB2 I would like to have a starting point. I'm looking to make sure I don't leave open doors and also I want ot make sure I don't get an Audit...
Last updated: -
Free IT Book: The Accidental Administrator: Cisco ASA Security Appliance
This week's free IT book comes with a bonus interview with the author, Don Crawley! Check out what he has to say about the book, the process, and the joys of being an IT-type personality. Then answer one of the questions below and post the link to your answer in the discussion section for your...
Last updated: -
Data vs. perimeter vs. network security
A short time ago, author Wes Noonan wrote some tips for SearchWindowsSecurity.com about deperimeterization. He explained how security is always pitted against business needs, and perimeters have become porous because businesses require traffic from SMTP, HTTP or VPNs to pass through the firewall....
Last updated: -
How to retrieve passwords in Thunderbird via HDD?
How does Thunderbird 8 store passwords and how does one retrieve them via HDD? I would usually use NirSoft, but it's not compatible with Thunderbird 8.
Last updated: -
We have a rogue user who knows more than she should. She can grant herself and other users the authority to access files that are supposed to be secured. Does anyone know of how we can monitor her activity or go back and review what she has done or anything that we can do. We think she may be using...
Last updated: -
Help with E-Mail error code 550 5.7.1
Can anyone help me please. I am trying to send an email to a business account but I keep getting the mails bounced back to me with the following error code. I have also tried to email someone else at their headquarters and get the same message...... reason: 550 5.7.1 Requested action not taken:...
Last updated: -
Security implications of a password blacklist
Does maintaining a password blacklist on database create any security risks? Basically, I'm looking to create a list of 500 or so commonly used passwords to stump very basic automated spambots.
Last updated: -
What should the process be to remove users on leave?
Typically when a user goes on disability, short term, or parental leave, do you disable their AD? What about their exchange? RSA? Smartphone?Also, is there usually a process to inform them that you are disabling their access?
Last updated: -
How do spammers send email that looks like its from a real company?
How do spammers send e-mails that appear as if they came from a big company and more importantly, are there techniques to detect which messages are soam and which are real? Are the emails being sent from a spammers server or do they hijack the company's mail servers. Is it possible for someone to...
Last updated: