Additional Resources
- Laptop Computer Security
- As laptops proliferate, theft has become an ever more critical security issue. Laptop buyers in search of a security solution are faced with a wide array of products, systems, and services, each of which addresses a part of the problem. There remains considerable confusion about the extent of protection provided...
- Tags: Laptop Computer, Notebooks, Security, Hardware, Notebooks & Tablets
- White papers 2003-03-01
- Problem receiving tasks in Outlook
- I use Outlook 2003 to assign and keep track of tasks in a small office network. Everything worked fine for quite a while until after a "Windows Update". Now when I send an assignment, the recipient gets the email but is unable to accept the assignment. A...
- Tags: Security administration, Patches, Microsoft Office, bennett@..., security update, security, Microsoft Outlook
- Discussion threads 2007-03-29
- Security Log Error Message
- I have a WIN XP Pro system that I am attempting to view the Security Log. I am able to view the Application and System log with a problem however with I click on the Security log I get the following error: Unable to complete the operation on...
- Tags: Microsoft Windows XP, hcouncil@..., Security Log
- Discussion threads 2007-08-16
- The spyware problem and other great security myths
- Endpoint security experts FutureSoft address how the driving pressures on business PC security have changed over the last five years and why that change now requires fundamental reappraisals of how businesses regard IT and informational assets, and how they approach security as a whole.
- Tags: Spyware, FutureSoft Inc., Security
- White papers 2007-03-01
- HP ProtectTools Security Manager - v2.0
- As computers become more mobile and better connected, threats to data security are increasing in magnitude as well as complexity. Business customers, for whom data security can have a direct impact on the health of their business, are becoming increasingly concerned about this problem. HP saw the need for a...
- Tags: Hewlett-Packard Co., Security
- White papers 2006-05-01
- your current security settings do not allow this file to be downloaded
- After recently being infected by a rootkit and re-installing XP Pro I decided to be a little more diligent in respect to my system's security.Today I started using the Security Configuration and Analysis snap-in in the MMC - I found it easily enough and imported a Security Template and applied...
- Tags: Web browsers, burnjob@..., security
- Discussion threads 2007-10-11
- Achieving Email Security Usability
- Despite the widespread perception that email security is of critical importance cryptographic email security is very seldom used. Numerous solutions to the problem of securing email have been developed and standardized but these have proved difficult to deploy and use. One of the main reasons for this difficulty is that...
- Tags: E-mail Security, E-mail, Cyberthreats, Online Communications, Security
- White papers 2006-02-07
- Security log is full
- hi, i have ran into a serious problem, i changed a few settings on the group policies at work, and now everybody's computer is getting locket out with a message saying "security log is full anly administrators can login"i changed the file siza to 1024 K in the group policie...
- Tags: demc_rock@..., Security Log
- Discussion threads 2007-10-10
- How to Conduct A Security Audit
- Information security encompasses more than just IT systems - people who use the systems can also inadvertently open security loopholes. A security audit aims to detect and highlight any problem areas within the IT infrastructure and staff behaviors.
- Tags: Information Security, Security Audit, Security
- White papers 2000-07-01
- THE NETWORK REQUEST IS NOT SUPPORTED
- I HAVE INTALLED SAMBA IN LINUX MACHINE AND IN SMB.CONF I HAD MADE SECURITY = USER.IT IS NOT GIVING ANY PROBLEM, BUT WHEN I AM MAKING SECURITY= SHARE IT IS GIVING ME THE PROBLEM.WHEN I AM CONNECTING IT THROUGH WINDOWS IT IS GIVING ME A PROBLEM " THE NETWORK REQUEST...
- Tags: cs.abhinav@..., network
- Discussion threads 2007-04-05
- Towards Security by Construction for Web 2.0 Applications
- While security experts routinely bemoan the current state of the art in software security, from the standpoint of the application developer, application security requirements present yet another hurdle to overcome. Given the pressure for extra functionality, "Lesser" concerns such as performance and security often do not get the time they...
- Tags: Web, Application Security, Web 2.0, Security, Internet
- White papers 2007-04-25
- HP ProtectTools Security Manager
- As computers are getting increasingly mobile and better connected, threats to data security are increasing in magnitude as well as complexity. Correspondingly business customers, for whom data security can have a direct impact on the health of their business, are becoming increasingly concerned about this problem. HP saw the need...
- Tags: Hewlett-Packard Co., Security
- White papers 2004-11-01
- Creating an Active Directory Site for Exchange Server
- Despite the widespread perception that email security is of critical importance cryptographic email security is very seldom used. Numerous solutions to the problem of securing email have been developed and standardized but these have proved difficult to deploy and use. One of the main reasons for this difficulty is that...
- Tags: Microsoft Windows Active Directory, Microsoft Exchange Server, E-mail Security, Server, E-mail, Cyberthreats, Online Communications, Security
- White papers 2005-10-31
- Active X Security
- I just purchased FastTrack:HTML and I can't get past the ActiveX security. I have my browser set to "low" security". I'll give you three days until I ask for my money back.CheersPaulWell Paul,This is a community forum where IT Pros attempt to answer problems so the threat...
- Tags: ActiveX/COM/COM+/DCOM, ActiveX, Active X Security, security
- Q&A; 2006-07-02
- Computer Security and the Law
- Advances in computer security law have been impeded by the reluctance on the part of lawyers and judges to grapple with the technical side of computer security issues. This problem could be mitigated by involving technical computer security professionals in the development of computer security law and public policy. This...
- Tags: Computer Security, Computer, Productivity, Viruses And Worms, Security
- White papers
- Problem with downloads.....
- Everytime I try to download a tutorial, I keep getting a message that says: " Your current security setting do not allow this file to be downloaded".I have rearranged my security setting every conceivable way and I cannot D/L any files.I have Norton Internet Security...could this possibly be interfearing with...
- Tags: jaibronx@..., D/L, security
- Discussion threads 2007-01-08
- Web Services Declarative Security
- A major problem facing businesses nowadays is how to quickly and effectively introduce new software technologies into their applications. This can be seen with the introduction of web services, and securing them using web services security. One solution to this problem is to use a declarative environment to rapidly test,...
- Tags: Web, Oracle Corp., Web Service, Web Services Security, Web Services, Channel Management, Security, Enterprise Software, Software, Marketing
- White papers 2004-11-01
- problem
- Good day!I want tell you about my problem.Somebady try to blok my Internet Explorer.Now when want to contiunue in the site on my display is write-- problem whith this website's security certificate.So when comme into in your site.Second problem is I can't use my restore sistem.Is bloked...
- Tags: tilviu
- Discussion threads 2007-09-16
- Null Sid Security Group problem in AD
- We have 3 Credit Union Branches, the 2 remote branches that run across a T-1 line are having problems on the domain where the Local Group Policy is not applied because of the Null Sid security group after running gpresults. I did some research & removing the computer from the...
- Tags: advertisement, uinthas@..., Null Sid
- Discussion threads 2007-10-19
- << Previous
- page 1 of 1
- Next >>