Questions & Answers

  • Security audit of access within Active Directory 2008 network

    We need to do a security audit to see what users have access to what within our Active Directory 2008 network. Is there a free tool to help with this and possibly reassign permissions based on rules?

    Troubleshooter24755 pointsBadges:
  • Database Design Help

    Organizations make business deals with other organizations. When negotiating a specific deal, each organization is represented by one lawyer. The same organization can have deals with many other organizations and it might use different lawyers in each case. Each lawyer has a first and last name,...

    JessRomanowski35 pointsBadges:
  • Template for creating source code security

    Anyone who has a template in creating a source code security policy? Thanks!

    Arisaquino5 pointsBadges:
  • SQL 2000 migration to SQL 2005 – need to preserve user security

    Hi, I have a customer that is planning on moving to new hardware and performing a SQL upgrade (2000->2005).  I know that our application (FileNet Image Services) is sensitive to what we refer to as an "orphaned" database.  Our app stops working if a database is simply detached/attached to...

    Vitomizer5 pointsBadges:
  • As400 security

    Hi, This is kinda urgent. Is there any way to restrict an user from viewing, writing, deleting anything from my AS400 library... I dont want unknown users to delete, change, create anything in my library or any of the source in the library.. Please help.....

    Nutangujar895 pointsBadges:
  • computer security

    What is a client-side attack and what are its potential effects (impact on confidentiality, integrity, availability) and what methods might be used to get the user to direct a browser to the rogue web server?

    hiwa7110 pointsBadges:
  • SQL 2005 Security to access 2 databases on same server via Stored Procedure

    We are tyring to apply best security practices by only granting EXECUTE security to Stored Procedures connected to a Role and make users members of the role. However the SP needs to access data from another DB on the same server and when trying we receive "SELECT permission was denied on the...

    A00001615 pointsBadges:
  • SSO on the web, 2-factor security

    Looking for a secure authentication and authorization process on WWW - to include federated logon to multiple pages (single sign on behavior) with more security than uid/pwd access - but without issuing a physical device ("something you have")? Some websites are copperating partners - others are...

    Justgottabeaway15 pointsBadges:
  • Has this computer been compromised?

    One of my computers runs a strange set of files that I don't recognize when it boots:bash.exe, curl.exe, uname.exe, sed.exe, rm.exe, tail.exe, cut.exe, awk.exe, cat.exe, chmod.exe, ls.exe, grep.exeI know I haven't uploaded any programs related to these files, so should II be worried about these...

    ITKE342,185 pointsBadges:
  • as400 printing issues

    I have a ta 3501 kyocera mfp! My customer is trying to print a report say 150 page report but they only want pages 5-20 and they select that but it prints the whole report?? ideas?

    isurferdude5 pointsBadges:
  • AES encyption: More secure than SHA1?

    I know this is more of a curiosity but I wanted to get some expert opinions on this. I recently heard someone recommend stepping up from md5ing (not to SHA1) but to AES encrypting the password, which would use itself as the key. Does anyone have any recommendations on if that would be more or less...

    ITKE342,185 pointsBadges:
  • email settings on a mac

    I have mail thru Ipage, using Imap. what is entry of incoming and outgoing mail server name setting and port# Check SSL ?

    sparkyelectric5 pointsBadges:
  • Does adding other programs to a firewall compromise security?

    I'm using Ubuntu 11.04 as a Firewall in SOHO environment with the thought of installing a GUI on it. Is it true that this would be a mistake because I should not run other applications on a firewall. Why is this the case?I just don't understand why putting a GUI on it would affect the "security" of...

    ITKE342,185 pointsBadges:
  • How to retrieve passwords in Thunderbird via HDD?

    How does Thunderbird 8 store passwords and how does one retrieve them via HDD? I would usually use NirSoft, but it's not compatible with Thunderbird 8.

    ITKE342,185 pointsBadges:
  • Tracking via WebTV

    Can an individual utilize webtv to surf various internet sites without having an activity or tracking log such as a phone log, modem dial out log, or internet browsing history. Is this an option to bypass any record tracking system?

    MicWel5 pointsBadges:
  • Email security: What does “message opened by mailclient” mean?

    I've recently read that a Belgium MP claimed that her email headers were being read during routing. It also said that the headers had this message "message opened by mailclient". What does this message actually mean?

    ITKE342,185 pointsBadges:
  • CL Commands with Independent Auxiliary Storage Pools.

    I have a CL program that errors out with a CPF1080 on the command STRSBS SBSD(MYLIB/MYSUBS). Are there other commands that will have this same problem and is there a list of these commands somewhere ?

    Dcarney115 pointsBadges:
  • after IPL the server is slow for hours

    I have Iseries , and after it finish count from 1 to 48, a black empty screen stayed for about 30 minutes .. and after it start working the server always become very very slow for about 3 hours ... is there any solution to that

    abar1425 pointsBadges:
  • Computers for business use, Mac’s or other?

    I run a small business and was wondering which type of computer is better to buy. If anyone can enlighten me that would be great. Thanks!

    Tammyv5 pointsBadges:
  • Shouldn’t a person just RSA-encrypt the entire document?

    After doing some research on Security, I've finally figured out how to verify if an email / document was actually sent by the "sender". Here's the process I've figured out:The sender gives their public RSA key to the recipient.The sender also uses SHA1 to hash the document.Then he uses his private...

    ITKE342,185 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following