Search Results | Compliance
PREV 1   2   3   4   5   6   7   8   9   10...   20   30   40   50   60   70...150 NEXT
Sort by:  Most Relevant  |  Date
messaging and collaboration

Answer  What is messaging and collaboration,how does it works,how to set it up ,where can it be implemented and how

Last updated: Jan 24, 2006   8:40 AM GMT   |    AIM, Availability, Bandwidth
email data retention laws

Answer  are inter-department email groups in a multinational bank subject to any US/UK financial regulation on data retention times..e.g. emails sent to a IT department's group mailbox which recieves requests from other departments in the organisation...e.g. legal restore requests, trader restore requests.....

Last updated: Jul 28, 2007   2:56 PM GMT   |    Compliance, Laws, Regulations
terminal server and gpo

Answer  i have a server 2003 that configure as a terminal server, and i want implement a strict acess to this server from client (xp pro) to that server, i create ou that called "for terminal users" and create for that ou a gpo, now,, i want to know how should i change the gpo to achive the next goals: 1. a...

Last updated: Aug 5, 2006   5:01 PM GMT   |    Access control, Application security, backdoors
802.11 vs 802.16

Answer  I have a small co. with a point to point wireless grid. I handle off site monitoring of gas nad oil flow. I have been overlaping my grid with new locations, and more to come. So I have been looking into new wireless Sys. I have made the choice to use All-In-One?360 Multi-Band/Multi-Mode Antenna WiMA...

Last updated: Aug 14, 2006   8:30 PM GMT   |    Arrays, Availability, Bandwidth
SECURE FTP SITE ON Windows 2003

Answer  We have a Windows 2003 IIS server setup behind our firewarll which is a PIX firewall. What is the best method to establish a secure FTP site on this IIS server? I have reviewed this topic on the internet and actually talked with somebody from IPSWITCH and the best method available is to purchase a...

Last updated: Sep 1, 2006   8:22 AM GMT   |    3Com, Access control, Application security
Design NEW network cum NEW IT infrastructure

Answer  Company expand so fast that the IT infrastructure is not fast enough to cater high volume of traffic; the initial design is not scalable. The number of new branch offices setup caused the company pay a high price in the leased line communication. Salesman and management staffs dial into company ne...

Last updated: May 14, 2006   7:54 AM GMT   |    Access control, Application security, Availability
Design NEW network cum NEW IT infrastructure-2

Answer  Company expand so fast that the IT infrastructure is not fast enough to cater high volume of traffic; the initial design is not scalable. The number of new branch offices setup caused the company pay a high price in the leased line communication. Salesman and management staffs dial into company net...

Last updated: May 14, 2006   8:21 AM GMT   |    3Com, Access control, Application security
Network Resource Allocation cum Planning cum Technical Problem

Answer  This is the real commercial problem face by my company. Well, the reason I ask this problem is I salute and respect all of you as I believe all of you are as good as network solution company out there, or even better!! Lets me rephrase the entire problem again. Company expand so fast that the IT...

Last updated: May 15, 2006   10:17 AM GMT   |    3Com, Access control, Active Directory
Laptop Security...

Answer  Hi, I am the head of my department and by the nature of the job I hold some confidential information on my laptop. How do I ensure that 1. Nobody can access any files on my laptop from the LAN or the internet (not even sys admins) 2. If somebody tries to access, can I find out /trace who it is or ...

Last updated: Jun 24, 2006   9:31 AM GMT   |    Access control, Application security, backdoors
SAS70

Answer  When benchmarking a SAS70 audit to determine if the necessary controls were audited, what standards do you use as guidance to determine the controls to be tested and the control objectives? Does IT rely on internal audit for guidance or do you have your IT processes documented?

Last updated: Jun 20, 2008   5:13 AM GMT   |    Auditing, Compliance, Risk analysis
Selecting an area within security to start

Answer  Hi, I'm studying for an MSc in Information Security from Royal Holloway University of London, I have a B.Engg. degree in computers and a PG Diploma in Networking and Communication as well as the CCSA and CCNA. I'm also studying for the CISSP. Now, with all these qualifications, could you please tel...

Last updated: Jun 24, 2007   4:06 PM GMT   |    Access control, Application security, Biometrics
Stop Error (C000021a)

Answer  I am receiving this stop error(C000021a) "windows logon process system process terminated unexpectedly" with win 2000 server. Safe mode and Last Known Good Conf. works fine. Is there any solution without reformating the HDD? I have ERD with me. Will that help me? Any advise on this would be highly...

Last updated: Jun 7, 2005   3:29 AM GMT   |    Biometrics, Call Center, CIO
Video Recording

Answer  I have a client that needs to record video and audio of sessions with their patients to become and maintain a specific certification. There will be eight professionals who need to do this. They would like to be able to record and move to DVD the sessions in the easiest way. The sessions are two peop...

Last updated: Oct 4, 2006   1:36 PM GMT   |    Compliance, Hardware, Laws
Blue Socket Gateway and Certificates

Answer  We are currently attempting to implement a Blue Socket Gateway in order to authenticate our wireless clients. I have been instructed by Blue Socket that the certificate used by them will not work through a NAT translation and that I should put this device on the outside of my ASA firewall. Apparen...

Last updated: Nov 7, 2006   5:05 PM GMT   |    Access control, Active Directory, Application security
Passwords

Answer  Hi all, What do you recommend for initial password issue, that is, provided a new user with a password for the first time without compromising it. I find the entire help desk giving password initially or sysadmins doing that is not save enough even though the user will be prompted to change it at f...

Last updated: Jul 4, 2006   8:11 AM GMT   |    Access control, Application security, backdoors
security problem

Answer  Hello, I have small workgroup having 10 computers in my office. I do some personal work in office like using yahoo messenger, checking personal e-mails and some online banking site. But how does one of my senior knows it? I do everything lonely and securely so that nobody in the office knows it. Bu...

Last updated: Oct 31, 2006   3:44 AM GMT   |    Access control, Application security, backdoors
Installation and updates

Answer  Howdy folks, Tryin to keep things going around here....need some advice. I have Win2003 servers and Active Directory.....single domain....approx. 100 client computers.....one location. Am upgrading all computers from Office XP to Office 2003. My project: Install Office 2003 and all updates remot...

Last updated: Aug 2, 2006   9:36 PM GMT   |    Access control, Active Directory, Application security
Port 1894

Answer  Hi, Our port scanner has detected '1894' as an open port. We know 1894 is an 'O2Server' port. Could you please throw some light on the port '1894'? Thanks kbs

Last updated: Jun 27, 2006   8:02 AM GMT   |    Access control, Application security, backdoors
Recommendations for OU and group policy design

Answer  Hi, We are currently running a Win2003 AD and have been for some time. As is the usual with this sort of thing, the OU and Group Policy structure has evolved over time and it's currently in a bit of a mess. I'd like to get some input on how best to re-design the OU and GPO structure. Any ideas a...

Last updated: Jun 28, 2006   6:40 AM GMT   |    Business/IT alignment, Compliance, DataCenter
iseries, application degv, change control or management

Answer  Look for some input in to best ways of handling change control change management on iseries. segregation of duties compliance, best way to move development changes from test environement in to prodcution, without having to have devlopement team having access to both. Maybe using a software applicat...

Last updated: Apr 13, 2006   12:22 AM GMT   |    Application development, AS/400, Compliance
PREV 1   2   3   4   5   6   7   8   9   10...   20   30   40   50   60   70...150 NEXT

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: