Network Security
I intend to get NAS centralized storage and be able to privatize some of my files. I would therefore like to know what user security application that NAS centralized storage uses. Is there anyone who is familiar with NAS and who could assist me? I will appreciate.
- 1019 views
- 1 answers
- 0 votes
Our Windows Server allows only changes to directories but does not allow changes to files. It is necessary that I make changes on permissions to the Windows server. Although I am familiar with Unix, I find Windows hosting different. Would the security risk be too high if I allowed read/write for everybody in the whole system directory or is it safe to do so? Please advise me.
- 869 views
- 1 answers
- 0 votes
The question I have is strange. I however request your understanding since the area of network security is new to me. Supposing an administrator modified a port number of an FTP port by say, changing 21 to 23, which is the number of Telnet; finishing the modification would create a pair of No. 23 ports. Would this outcome on an FTP port interfere with data traffic? Your helpful advice/opinion is highly welcome.
- 855 views
- 1 answers
- 0 votes
Before they can have full network access, I would like to be certain that network clients are updated. The recent windows updates should be installed, Windows firewall is enabled and other security features. Where should I start checking?
- 927 views
- 1 answers
- 0 votes
Please help me how I can change the NcFTP redial delay from the present time of 20 seconds. I also want to set up the default setting to ask for a username instead of using anonymous logins. Is this possible? And what happened to the Visual mode?
- 1199 views
- 1 answers
- 0 votes
There is need that I ascertain the complete control of our sites’ replication. The way I have been controlling is by ensuring replication can only be done in one way. What I need to know is whether this is able to manage all data traversing the communication ports for our two DCS. I understand that IPSEC tunnels are able to restrict the number of accessible ports required on the firewall. I also understand that it is possible to unencrypt it for the IDS/IPS to still manage the flow of traffic. But how this done? Your advice will be highly appreciated.
- 1002 views
- 1 answers
- 0 votes
Our organization desires to combine our active directory forest islands into one active directory forest with a root domain. The root domains will be maximum two. Apart from two or three forests that are used in offsite replication for DR purpose, the forests are separated by firewalls and do not communicate.
The cause of our problem is that our current setup is such that a lower security area cannot start communication with a higher security one. A two way communication is only possible when initiated by a DC in high security area. Is there a way of providing security that allows DC to DC communication two break through firewall? Help us.
- 1035 views
- 1 answers
- 0 votes
I have read that “securing your wireless network is a simple process that costs nothing and could save you from a disastrous network breach down the road”. How can I secure my wireless network?
- 985 views
- 2 answers
- 0 votes
Consider the following situation, you have in possession two servers, let’s call them Server One and Server Two.
Server One has all the graphical software such as AutoCAD while Server Two has all the regular software and it is the server catering to the users.
Both servers are not linked in any way – They are not in a network. If you would like to give a certain user from Server Two access to a certain application in Server One, how would you go about configuring that, without compromising security in both servers?
- 827 views
- 3 answers
- 0 votes
Is Bus activity is in the form of transcations?if so then share few of PCI Commands?
why C/BE lines are used?
- 938 views
- 1 answers
- 0 votes