• Do any antivirus products use “canary files” to detect rootkits?

    Which antivirus programs use "canary files" with common strings in their filenames to detect:1.) MyRootkit.vir is known to hide files which include the string ".vir" in their filename.2.) Upon installation (or signature update) MyAV puts MyRootkitcanary.vir in C:\Program Files\MyAV\Canary Files\3.)...

    ITKE56,485 pointsBadges:
  • Is it possible to block souce IP’s by their presence in a BotNet?

    A friend of mine in the security industry recently told me that many DOS attacks and general "black hat hacking" attacks usually happen over the TOR network. Would it be possible to dynamically block source IP's by their presence in a BotNet?Would this be effective in blocking DDoS attacks? How...

    ITKE56,485 pointsBadges:
  • Replace ” with ” in AS/400 string

    Hi i have a string and want to replace all occurance of " with ".Please let me know how can i accomplish this .

    munduuu420 pointsBadges:
  • Middle ground password security policies

    What password policies are the best without going crazy? We want security but changing passwords 2 times a month is too much. What is a healthy middle ground between security and convenience?

    TeachMeIT975 pointsBadges:
  • Does SSL equal secure email through transit?

    If an email server sends messages via SMTP/SSL and the recipient uses SSL to receive his email, will the message be secure through the entire transit? Des this mean the e-mail will be delivered in plain text between the servers?

    ITKE56,485 pointsBadges:
  • Passwords stored in memory: Is it safe?

    I recently realized when you save a password in a variable, it's actually stored as plain text in the memory.I know the OS does a good job by forbidding processes from accessing other allocated memory. But isn't it still bypassable? Is there a safer way to store passwords to make sure processess...

    ITKE56,485 pointsBadges:
  • I’m looking for a stronger authentication method for web services

    I deployed a two-factor-authentication solution in order to strength logon to our web applications. The majority of our users who have new tokens are also pop3/imap users (this is from a long time ago). However, I noticed web applications are well protected by 2FA , but mail applications is an easy...

    ITKE56,485 pointsBadges:
  • how to keep display the same page of the subfile from where record got deleted in as400?

    Hi, I have a load all subfile which is used to display the records of a file on the screen. I have the previlage to either enter/delete the records on screen, which will be shown on the screen.Now, my SFLSIZE is 16 And SFLPAG is 15. now i have 25 records on display. now i am deleting 20th record,...

    Sai4AS4001,420 pointsBadges:
  • Generating strong, unique and memorable passwords

    Can someone help me with good strategies for generating personal passwords that are unique and strong, but easy to remember?

    ITKE56,485 pointsBadges:
  • RSS

    Is there a prevailing format for RSS feeds? If I wanted to produce one, should I go with ATOM or RSS 2.0?

    Kknight8520 pointsBadges:
  • Permeability & Permittivity

    What are the basic differences between permeability & permittivity? Please explain it to me.

    Atmark5 pointsBadges:
  • Capacity of drive

    My external drive is supposed to have a capacity of about 1TB (931 GB, but when I tried to back up the data on my new computer, it said it was full after 459 GB. With my old computer, it appeared to back up everything.

    ronphotoblue5 pointsBadges:
  • Hyper-V 2012

    I have a installation of Hyper-v 2012 with an SBS 2011 VHD. Snapshots have been setup and have filled the drive (nearly 1tb of snapshots). I have moved these snapshots to a USB drive and not it says its merging 10% and its been stuck there for a while. The main VHD is growing and the avhdx file is...

    MattFusion5 pointsBadges:
  • Exchange mailbox reports

    Can some one please tell me how to enable to track mailbox content and mailbox traffic of my company. I want to create a report based on the mailbox traffic and content. I want to automate this process because I don't want to log in every month.

    bradcam5 pointsBadges:
  • Is it possible to allow multiple users edit an outlook meeting?

    We have frequent meetings that we are several people that need to be able to edit/update the details of the meeting, body text for example. Problem is that the meeting organizer seems to be the only one able to do this. Is there a way to make others able to edit the meetings?

    Reimar5 pointsBadges:
  • Software Quality Assurance Test by IKM

    Does anybody have sample questions from the Software Quality Assurance test by International Knowledge Management?

    Arunkumarprakash5 pointsBadges:
  • IKM assessment

    Can anybody help me with IKM Quality Assurance sample questions please

    d12345 pointsBadges:
  • How do I change my setting on my DVD player from Chinese to English?

    DVD - 209

    hilofoodstores5 pointsBadges:
  • How to convert FXP to PRG file name (ITMAS.FXP TO ITMAS.PRG)

    How can I convert FXP to PRG?

    hirenbhatt30 pointsBadges:
  • Throughput under bit-reversal

    Throughput under bit-reversal. What fraction of capacity does a 4-ary 2-fly achievewhen routing the bit-reversal traffic pattern?

    somiya5 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following