Questions & Answers

  • SSO on the web, 2-factor security

    Looking for a secure authentication and authorization process on WWW - to include federated logon to multiple pages (single sign on behavior) with more security than uid/pwd access - but without issuing a physical device ("something you have")? Some websites are copperating partners - others are...

    Justgottabeaway15 pointsBadges:
  • Has this computer been compromised?

    One of my computers runs a strange set of files that I don't recognize when it boots:bash.exe, curl.exe, uname.exe, sed.exe, rm.exe, tail.exe, cut.exe, awk.exe, cat.exe, chmod.exe, ls.exe, grep.exeI know I haven't uploaded any programs related to these files, so should II be worried about these...

    ITKE342,450 pointsBadges:
  • as400 printing issues

    I have a ta 3501 kyocera mfp! My customer is trying to print a report say 150 page report but they only want pages 5-20 and they select that but it prints the whole report?? ideas?

    isurferdude5 pointsBadges:
  • AES encyption: More secure than SHA1?

    I know this is more of a curiosity but I wanted to get some expert opinions on this. I recently heard someone recommend stepping up from md5ing (not to SHA1) but to AES encrypting the password, which would use itself as the key. Does anyone have any recommendations on if that would be more or less...

    ITKE342,450 pointsBadges:
  • email settings on a mac

    I have mail thru Ipage, using Imap. what is entry of incoming and outgoing mail server name setting and port# Check SSL ?

    sparkyelectric5 pointsBadges:
  • Does adding other programs to a firewall compromise security?

    I'm using Ubuntu 11.04 as a Firewall in SOHO environment with the thought of installing a GUI on it. Is it true that this would be a mistake because I should not run other applications on a firewall. Why is this the case?I just don't understand why putting a GUI on it would affect the "security" of...

    ITKE342,450 pointsBadges:
  • How to retrieve passwords in Thunderbird via HDD?

    How does Thunderbird 8 store passwords and how does one retrieve them via HDD? I would usually use NirSoft, but it's not compatible with Thunderbird 8.

    ITKE342,450 pointsBadges:
  • Tracking via WebTV

    Can an individual utilize webtv to surf various internet sites without having an activity or tracking log such as a phone log, modem dial out log, or internet browsing history. Is this an option to bypass any record tracking system?

    MicWel5 pointsBadges:
  • Email security: What does “message opened by mailclient” mean?

    I've recently read that a Belgium MP claimed that her email headers were being read during routing. It also said that the headers had this message "message opened by mailclient". What does this message actually mean?

    ITKE342,450 pointsBadges:
  • CL Commands with Independent Auxiliary Storage Pools.

    I have a CL program that errors out with a CPF1080 on the command STRSBS SBSD(MYLIB/MYSUBS). Are there other commands that will have this same problem and is there a list of these commands somewhere ?

    Dcarney115 pointsBadges:
  • after IPL the server is slow for hours

    I have Iseries , and after it finish count from 1 to 48, a black empty screen stayed for about 30 minutes .. and after it start working the server always become very very slow for about 3 hours ... is there any solution to that

    abar1425 pointsBadges:
  • Computers for business use, Mac’s or other?

    I run a small business and was wondering which type of computer is better to buy. If anyone can enlighten me that would be great. Thanks!

    Tammyv5 pointsBadges:
  • Shouldn’t a person just RSA-encrypt the entire document?

    After doing some research on Security, I've finally figured out how to verify if an email / document was actually sent by the "sender". Here's the process I've figured out:The sender gives their public RSA key to the recipient.The sender also uses SHA1 to hash the document.Then he uses his private...

    ITKE342,450 pointsBadges:
  • Is there really a security advantage when it comes to spittling a password?

    I've been reading more and more about the LANMAN (LM) hash and I'm having trouble understanding some of the concepts. Is there really any security advantage when it comes to splitting a password, encrypting the two halves separately, and combining the halves to form one hash? Or is it just more of...

    ITKE342,450 pointsBadges:
  • Questions about our single firewall setup

    We are planning to run the following setup: a firewall between our internal zones and the public internet. Each of our trusted zones use a different VLAN with a 3-layered switch while the DMZ zone is on the firewall itself, trunked to a layer 2 switch on the firewall.Would this setup provide...

    ITKE342,450 pointsBadges:
  • Clearing qsysopr message queue

    When we IMPL the operator message queue (QSYSOPR) is clear. Is there a way to prevent this from happening.

    AS400PCFileTransfer16115 pointsBadges:
  • OVRDBF and OPNQRYF

    Can we write OPNQRYF then OVRDBF with SHARE(*YES) and then call a program. Will this program will process only selected records from OPNQRYF or process all records?

    sunnygupta35 pointsBadges:
  • SQL and OPNQRYF

    What we can do in SQL which we cannot do in OPNQRYF

    sunnygupta35 pointsBadges:
  • Licensing/pricing options around Forefront Client Security

    What are the licensing/pricing options around Forefront Client Security? This question is from the Microsoft Live Chat which took place on July 13th.

    ITKE342,450 pointsBadges:
  • Recording failed login attempts in security log for Windows XP SP3

    Can we record any other information in the security log about a failed log in attempt on a Windows XP SP3 desktop? And if so what other information and how can we get at it?

    NewnanIT1,110 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following