Solved

Question for  FlamingSword

Posted on 2002-03-20
2
145 Views
Last Modified: 2010-04-11
Thanks for your assistance in Q#20275781
0
Comment
Question by:Jerryleo
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 3

Accepted Solution

by:
FlamingSword earned 15 total points
ID: 6916752
Thanx -- for
Question: Is it necessary to install IDS if the machine has run a firewall?
0
 

Author Comment

by:Jerryleo
ID: 6916865
Yes.

Thanks for your assistance in Question: Is it necessary to install IDS if the machine has run a firewall?

Thanks again!

Best Regards
0

Featured Post

Enterprise Mobility and BYOD For Dummies

Like “For Dummies” books, you can read this in whatever order you choose and learn about mobility and BYOD; and how to put a competitive mobile infrastructure in place. Developed for SMBs and large enterprises alike, you will find helpful use cases, planning, and implementation.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
SMTP connect() failed - WordPress 6 59
Kaspersky Security 9.0 for Exchange Server Issue 4 42
Need a modeling tool 2 43
80072efd error while checking for updates. 20 53
If you are looking at this article, you have most likely been hit by some version of ransomware and are trying to find out if there is anything you can do, or what way you should react - READ ON!
Many businesses neglect disaster recovery and treat it as an after-thought. I can tell you first hand that data will be lost, hard drives die, servers will be hacked, and careless (or malicious) employees can ruin your data.
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

730 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question