Questions & Answers

  • Windows utility

    Which Windows utility shows the devices that an IP packet travels through from source to destination?

    Drecoma5 pointsBadges:
  • Can you provide an example of a one-time password algorithm?

    I'm trying to develop a website, along with a corresponding helper program (that would be installed on a user computer). Both the website and the program will communicate with each other through AJAX but I know it will be a huge security risk other web pages can send requests to the program. I need...

    ITKE366,220 pointsBadges:
  • Is it ok to use a weak password as long as I have two-factor authentication?

    When it comes to passwords, I'm pretty strong. I never reuse passwords across sites and I try to use two-factor authentication when it's available. But I do realize that typing all those passwords is a problem. A good friend of mine asked me why I don't use a weak password when two-factor...

    ITKE366,220 pointsBadges:
  • My key fob system has been working fine. Is there any need to upgrade?

    I've noticed that my key fob system has been acting slowly but is still working pretty good. Should I upgrade or hold off?

    ITKE366,220 pointsBadges:
  • Are there any particular multifactor authentication issues to consider in the healthcare industry?

    A friend of mine is getting into the healthcare industry has some concerns, particularly when it comes to security. Are there any particular authentication issues that he needs to know about in the healthcare industry?

    ITKE366,220 pointsBadges:
  • How can I allow end users to transfer security groups in Active Directory?

    In our organization, our users logon to their desktops with Active Directory and access SharePoint using Windows authentication. But many of our users frequently change teams, so their access to their old SharePoint team site should be removed. Our maintenance team is refusing to setup groups for...

    ITKE366,220 pointsBadges:
  • How do I generate a Google application-specific password from a shell script?

    I've recently enabled two-factor authentication on Google, but no my Google export scripts aren't working. My computer is verified and trusted but, for some reason, the scripts are not. Basically, every time the CRON job is run, I keep getting this 'Google verification code' and the script fails....

    ITKE366,220 pointsBadges:
  • Sending a text message from the AS/400

    Is there a way to send a text message to a cell phone from the AS/400 preferably without having to purchase some third party software?

    ElTerrifico620 pointsBadges:
  • Changing default password to expire the password when users log in

    I want to change default password to expire the password when users log in. How do I accomplish this?

    DCORDERO4725 pointsBadges:
  • What’s the best way to generate a cryptographically secure token?

    In order to generate a 32 character token for access to our API, we've been using this: $token = md5(uniqid(mt_rand(), true)); But someone told us that this isn't the best way to secure it and that we should use this instead: openssl_random_pseudo_bytes What's the best way here? Thanks for the help.

    ITKE366,220 pointsBadges:
  • How do I set up a PHP password recovery script with a 24-hour token?

    I'm trying to set up a PHP password recovery script, that would use a token but would expire after 24 hours. I'm having trouble setting it up. All I have right now is SHA1 encrypted user passwords but I really need to append a token to the URL that gets sent to the user when they request a password...

    ITKE366,220 pointsBadges:
  • What is the correct way to log out of an HTTP authentication-protected folder?

    Does anyone know of the right way to log out of HTTP authentication protected folder? I understand there are workarounds but they can be dangerous too. Does anyone have a good solution?

    ITKE366,220 pointsBadges:
  • What are the Identity Access Management options in Windows Azure?

    I currently have a mobile application that's been using AWS's IAM infrastructure that allows me to provide temporary access tokens to anonymous mobile devices. This allows them to run queries against AWS services from a mobile device. Would anyone happen to know if Windows Azure has a drop-in...

    ITKE366,220 pointsBadges:
  • How do I create a SAML authentication request using Windows Identity Foundation?

    I'm trying to use an API to create SAML authentication requests and receive/interpret the SAML responses but I'm not sure of the best way to do this. I've figured out how to receive and interpret the responses. Can someone point me in the right direction on using APIs to create SAML requests. Thank...

    ITKE366,220 pointsBadges:
  • V5R4 IBM support

    Hi all - does anyone know when IBM will cease to support V5R4 of the iSeries operating system?

    Bristoldoug45 pointsBadges:
  • How do you configure load balancing on unequal path with OSPF

    please tell me how to configure load-balance on unequal path with ospf.

    Vinesh123480 pointsBadges:
  • Installation of IBM 9.0 on Windows 8

    Is it possible to install IBM 9.0 on Windows 8 with 64-bit machine. What is the hardware requirement to install and run IBM Notes 9.0

    shivasanjay3,120 pointsBadges:
  • SUBFILE – To read only the UNCHANGED RECORD

    Hi, please help me with the logic how can I read the subfile when the record is not changed. (The user did not touch or crossed the subfile of particular record). How can I deal with that? After searching, I came to know we can achieve only with SFLNXTCHG keyword. But I don't how to proceed with...

    srivijay1320 pointsBadges:
  • How do I delete/erase cookies after a trip to a foriegn country?

    On a trip to Canada, I used local Wi-Fi hot spots to access internet. I want to minimize security breach possibilities by removing the cookies and or URL references.

    tompoe5 pointsBadges:
  • Are there any alternatives to multifactor authentication that protect user information as well?

    Does anyone happen to know if there are any alternatives out there to multifactor authentication that will protect user information as well?

    ITKE366,220 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following