Brush up on the basics or master the advanced techniques required to earn essential industry certifications, with Courses. Enroll in a course and start learning today. Training topics range from Android App Dev to the Xen Virtualization Platform.
Articles & Videos
Network security consists of the policies adopted to prevent and monitor authorized access, misuse, modification, or denial of a computer network and network-accessible resources. Network security involves the authorization of access to data in a network, and covers a variety of computer networks; conducting transactions and communications among businesses, government agencies and individuals. Networks can be private, such as within a company, and others which might be open to public access.
Please recommend a good scanner that will scan an IP address and the device connected to it for vulnerabilities. The network passed all of the free scanning tests off by expert exchange.
I have a customer who has a small Server 2012 network. 8 workstations and one wireless AP (for computers on his domain). Their internet is Cable. Comes in to a SonicWall TZ100.
What is the most…
On domain controllers (Mostly server 2008 R2 and some server 2012 R2) when a non-domain members attempts to connect to the DC they are prompted for their network credentials. Which keeps …
I need to setup static routes
i basically want to
destination 188.8.131.52 --> 184.108.40.206
destination 220.127.116.11 --> 18.104.22.168
basically so 22.214.171.124 is translated to …
My assistants account is locked out. He is a member of Domain Admins and Administrators.
When I unlock it, it locks again within 30 seconds. He is currently not at work so I know it's not him …
It seems that I can't ping a configured physical interface and VLAN interface on my Sonicwall. However, ping has already been enabled on this interface. Any idea ?
We have several machines on the same network, however services are firewalled (ports 1433, 1434, etc are scoped or firewalled off from the other servers)
However, when using SQL Server Native …
Our financial service vendor gave the attached doc which I need to review:
Will add more queries but do give feedback in the meanwhile:
instead of SHA-1 which will …
I got a trial access to F5's web fraud prevention: need anyone to suggest the test / PoC cases
that I could do to test it. My first time of the concept of web fraud prevention as well as the
Examines three attack vectors, specifically, the different types of malware used in malicious attacks, web application attacks, and finally, network based attacks. Concludes by examining the means of securing and protecting critical systems and information against these types of occurrences.
I’m helping one of my customers out with their website and PCI compliance has come up. They’re a theatre so have a bar / box office and e-commerce through their website. My understanding is that SAQ B…
We are providing outsourcing for our customers. One of our large government customer needs to encrypt the communications between our DC’s, File Servers and Printers.
After discussing with third…
I have been experiencing Issue with Blocking YouTube Via Application Control Feature through fortigate Appliance.
So far i have been able to Block youtube Using Web Filtration in Mozilla and …
anyone know what is the latest edition of PCI compliance with full documentation on it.
any suggestion / step by steps guide to implement that, get it compliance
What is the risk and…
I am new to VLAN. In the past, I have been setting up unmanaged switch for my clients. Going forward, I would like to setup a managed switch and separate server, workstations, …
Hello - i work for an IT support company and our client base is mainly up of companies with 5 - 50 computers. i am looking for the easiest way to ensure we are aware of EVERY device that comes on to …
A local church has been using Safe Eyes to monitor and regulate Internet activity on for their computers. They would like to replace the software with a service or software that provides more …
I am just wondering what extra could I do for my company from the security point of view.
We have onsite server, exchange online, firewall and analyzer on place, AV running on each wks …
So I've got a Watchguard firewall and I want to create a 'branch office VPN' connection to an IPfire firewall that's running OpenVPN ... is that possible? If yes, how?
And 'Mobile VPN' on …
Are there any best practices out there when it comes to granting a vendor an 'admin level' domain user login in a HIPAA environment, that will either have it expire, not require a change in …
I know Office 365 security and compliance module already has something like this but it's not ideal... Clumsy to export and too much manipulating data to get the simple data i'm looking …
I am able to access my SQL Server instance from within the network using SERVERNAME/Instance Name. However it does not work when I try accessing it using IP/Instance Name. I have enabled the named …
My OS is win 10 pro 64 bit and I have msn email the free one. My User to login into my pc is my email address and its password, that was how Microsoft set it up when I had to ask them for paid …
I am following up with a new question on how to create a Guest WiFi VLAN to separate LAN/WAN traffic inside our home network.
After extensive online researching, I cannot seem to …
"Oh crap. I think we've been hacked." That's the last sentence you ever want to hear from your IT guy, and the last sentence you ever want to have to say to your customers and clients.…
Since my first article (https://www.experts-excha
7,864 points this week
2,626 points this week
2,000 points this week
New York City, New York, United States
1,000 points this week
Centurion, South Africa
1,000 points this week