Questions & Answers

  • UVO 2.0 player played .av4 files on one vehicle, but not an exact same other?

    dabobguy5 pointsBadges:
  • apps

    What is a rooted app

    madrifter5 pointsBadges:
  • What’s in your network security and troubleshooting toolkit?

    Just curious what tools you have in your network toolkit? I've heard or used snort, TCPDump, NMap, but would love other suggestions

    Michael Morisy8,293 pointsBadges:
  • UNIX Security Assessment

    What is the best way UNIX Assessment procedure?

    Dharmagrao100 pointsBadges:
  • Local Policy location

    Where in local policy is the the ability to disable the calc from the user from using it. I have looked and Googled until I am blue in the fac.Thanks

    Harisheldon5,490 pointsBadges:
  • Masters in Network from UK or Cisco Certifications

    Hi All, I am new to this forum and after reading to many forums i feel you guys can really help me out of the mess. Currently i am working in an IT company as Sr. Software Engineer for Oracle Applications(2 years of experience) but lately i feel more inclined towards Computer Network and also i...

    NikunjM15 pointsBadges:
  • Can’t open repot from oracle report builder 10

    When I tryto open one report from oracle report builder 10g the report builder is stoped working and close report builder by windows 7

    ahmedmilhim5 pointsBadges:
  • wi-fi icon vanished

    I have a Huawei 8665 & Consumer Cellular is my carrier. I have used my AT&T home service for the wi-fi on my phone with no problem till last nite, my wi-fi icon has disapeared even though I am still connected acording to my settings. I have worked all day trying to correct this with no...

    snipitchick5 pointsBadges:
  • Interpreting security audit information

    Have switched auditing on for a specific directory in the IFS, information is being collected in the audit journal. Now, how do I actually interpret when a file is deleted? I gleaned I need to look for an LD journal type - when I do a test delete of a file is generates numerous LD types, but I...

    Tinast35 pointsBadges:
  • AS/400 query security

    I have a library we will call liba. In liba i have files for different companies. For eg: files aa01.itm is an inventory file for co# 01 and bb01.cms is a customer file for co# 01. I also have files aa07.itm and bb07.cms. These files are for co# 07.I want to grant someone access to only the files...

    Lougoalie5 pointsBadges:
  • Data vs. perimeter vs. network security

    A short time ago, author Wes Noonan wrote some tips for SearchWindowsSecurity.com about deperimeterization. He explained how security is always pitted against business needs, and perimeters have become porous because businesses require traffic from SMTP, HTTP or VPNs to pass through the firewall....

    RobynLorusso230 pointsBadges:
  • How to install Windows updates without Open File Security popup

    I deploy Windows updates for new computers with VBScript. With some of the updates Open File Security popup comes up and I can't install the update passively or quietly. How can I do that silently?

    WindowsServerATE335 pointsBadges:
  • Security audit of access within Active Directory 2008 network

    We need to do a security audit to see what users have access to what within our Active Directory 2008 network. Is there a free tool to help with this and possibly reassign permissions based on rules?

    Troubleshooter24755 pointsBadges:
  • Database Design Help

    Organizations make business deals with other organizations. When negotiating a specific deal, each organization is represented by one lawyer. The same organization can have deals with many other organizations and it might use different lawyers in each case. Each lawyer has a first and last name,...

    JessRomanowski35 pointsBadges:
  • Template for creating source code security

    Anyone who has a template in creating a source code security policy? Thanks!

    Arisaquino5 pointsBadges:
  • SQL 2000 migration to SQL 2005 – need to preserve user security

    Hi, I have a customer that is planning on moving to new hardware and performing a SQL upgrade (2000->2005).  I know that our application (FileNet Image Services) is sensitive to what we refer to as an "orphaned" database.  Our app stops working if a database is simply detached/attached to...

    Vitomizer5 pointsBadges:
  • As400 security

    Hi, This is kinda urgent. Is there any way to restrict an user from viewing, writing, deleting anything from my AS400 library... I dont want unknown users to delete, change, create anything in my library or any of the source in the library.. Please help.....

    Nutangujar895 pointsBadges:
  • computer security

    What is a client-side attack and what are its potential effects (impact on confidentiality, integrity, availability) and what methods might be used to get the user to direct a browser to the rogue web server?

    hiwa7110 pointsBadges:
  • SQL 2005 Security to access 2 databases on same server via Stored Procedure

    We are tyring to apply best security practices by only granting EXECUTE security to Stored Procedures connected to a Role and make users members of the role. However the SP needs to access data from another DB on the same server and when trying we receive "SELECT permission was denied on the...

    A00001615 pointsBadges:
  • SSO on the web, 2-factor security

    Looking for a secure authentication and authorization process on WWW - to include federated logon to multiple pages (single sign on behavior) with more security than uid/pwd access - but without issuing a physical device ("something you have")? Some websites are copperating partners - others are...

    Justgottabeaway15 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following