Quantcast
Channel: IT Answers » Vulnerability Assessment & Audit
Browsing all 19 articles
Browse latest View live

Is Windows security an afterthought?

As the editor of SearchWindowsSecurity.com, I often speak with users about their Windows security responsibilities. One senior systems analyst in particular sent me an interesting note recently… To...

View Article


Data vs. perimeter vs. network security

A short time ago, author Wes Noonan wrote some tips for SearchWindowsSecurity.com about <a...

View Article


ping from outside

hi, could you please tell me which command in cisco routers prevent them from being ping from outside networks. and also how can i prevent terminals inside a network to ping outside ips(group policies...

View Article

Files and directory access loging

one of my clients is asking about a daily report contains all files and directories accessed every day and who is accessing it (time and mode:delete ,read ,write.) on a spicific share. so i tried using...

View Article

Certificates

I am pretty new to the 2003 Microsoft world, but I am NT 4 MCSE. My setup: 2 W2K3 DC’s 1 Exchange 2K3 member server 1 W2K3 member server–web server about 60 users–single domain some of my users want to...

View Article


IM Blocking and URL Filtering

We have Pix515E which is gateway to Internet. We also got IWSS Proxy(Trend Micro) along with URL filtering module. Domain users get directed to IWSS proxy (GPO settings) and restrictions about URL...

View Article

aaa authorization ?

Which of the following authorization commands are valid? (we have to choose 2 correct) A. aaa authentication exec home radius B. aaa accounting exec home radius C. aaa authorization default none D. aaa...

View Article

Shares Baseline Security Information

Hello, I use the Microsoft Baseline Security Analyser 2.0 to retrive information about shares in some local servers. I can not understand the diference between the information give in the report, about...

View Article


Security advisories

Does a security research firms track record of vulnerabilities and exploits published make you trust them more, or more likely to hire them?

View Article


Website monitoring suggestions?

Question Edited by MTidmarsh

View Article

trojan horse downloader

Question Edited by AngelaN

View Article

Internet Explorer vs. Firefox

New Discussion Post by

View Article

Developing an antivirus (efficient):for Windows:Using VC++-2

New Answer by TomLiotta

View Article


Developing an antivirus (efficient):for Windows:Using VC++

New Answer by MTidmarsh

View Article

SOX Vulnerability Assessment & Audit Prodcuts

New Answer by MTidmarsh

View Article


DosCreateMutexSem privilege escalation

New Discussion Post by CarlCioffi

View Article

which tools can be used to analyse vulnerabilities?

Question Edited by Michael Tidmarsh

View Article


Vulnerability Test analysis

Question Edited by ITKE

View Article

Which is more vulnerable among IBM, MS, Apple, Samsung?

Question Edited by Michael Tidmarsh

View Article
Browsing all 19 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>