Hello, I'm the Assistant Editor on SearchWindowsSecurity.com. I'm looking to start a discussion about what browser people are using and why. Also, is anyone considering switching from IE to Firefox, or are your plans to stay with IE? Here's some food for thought... As of Feb. 2005, an estimated 35...
Thanks! We'll email you when relevant content is added and updated.
For some reason, at random, among 20 PCs on my network, in the morning or during the day, the network connection stops responding for both intranet and internet communications. The only solution thus far is to remove the NIC from the Device Manager, reboot the PC, and let Windows XP Pro find the...
Thanks! We'll email you when relevant content is added and updated.
I am getting ready to Retire from my current employer. I will not be working in this field as I have started a very different and unique business. have looked all around to find out how to unsubscribe but can not easily find out how. If anyone knows how, please let me know.
Thanks! We'll email you when relevant content is added and updated.
We are a company where we have experience on network remote administration and now we have open a new area, The area of security. Now I need to start to make new procedures like when a new customer come to us and ask if we can handle the security for his network. I need to know if some one can...
Thanks! We'll email you when relevant content is added and updated.
I installed eJabber and am using it with PSI clients. The clients can keep a history of their chats. Is there a way to have the eJabber Server log the IM chats? I did not see it in the system information.
Thanks! We'll email you when relevant content is added and updated.
I want to develop instant messenger for my company which work on intranet, everyone in company use it for chatting, file sharing, task creation work. Let me know what basic things I required for it, like what server-client architecture. I need to use when clients are mobile devices works on Android...
Thanks! We'll email you when relevant content is added and updated.
Is Trillian still being supported or developed? The last time I used it, it got too buggy to even open. Plus, Trillian's own support page is saying that it's just been quiet on their end. Is it safe to assume I won't be able to use it again?
Thanks! We'll email you when relevant content is added and updated.
Dear All, I am wrting this mail to you all, to know if any you have been successfull in Blocking Chats on your networks, and if so, then how have you acheived it? Could you please tell me which Ports to Block for MSN, Yahoo, Rediff, ICQ, Skype. I am using a NetAPPs Net Cache C 1300, and I am trying...
Thanks! We'll email you when relevant content is added and updated.
Hi, I'm in the process of hardening the DB2 in Linux and I'm looking for a checklist to help me make sure I don't miss anypoint. Since I'm not an expert on DB2 I would like to have a starting point. I'm looking to make sure I don't leave open doors and also I want ot make sure I don't get an Audit...
Thanks! We'll email you when relevant content is added and updated.
A short time ago, author Wes Noonan wrote some tips for SearchWindowsSecurity.com about deperimeterization. He explained how security is always pitted against business needs, and perimeters have become porous because businesses require traffic from SMTP, HTTP or VPNs to pass through the firewall....
Thanks! We'll email you when relevant content is added and updated.
We have a rogue user who knows more than she should. She can grant herself and other users the authority to access files that are supposed to be secured. Does anyone know of how we can monitor her activity or go back and review what she has done or anything that we can do. We think she may be using...
Thanks! We'll email you when relevant content is added and updated.
Apart from honeypots, what are the different methods to find unknown threats which are prevalent? How do I find methods to mitigate them. PS: all the vulnerabilities are known to all the n/w administrators and then can take measures to mitigate attacks but this doesn't happen..Hackers are at least...
Thanks! We'll email you when relevant content is added and updated.
Often times many consumers get these e-mails from Nigeria, Russia, China and so on purporting a long drawn out story about a deceased king and so on. They can be caught by looking at their headers, but I've been told sometimes they use fake e-mail addresses. Is their a fool proof way to identify...
Thanks! We'll email you when relevant content is added and updated.
Removal from IM list?Fri, 21 Dec 2012 00:50:20 You have been automatically removed from the IM list (im) as a result of repeated delivery error reports from your mail system. This decision was based on the list's automatic error monitoring policy and has not been reviewed or otherwise confirmed by...
Thanks! We'll email you when relevant content is added and updated.