Questions & Answers

  • Your mobile device security policy

    From a security perspective, how are you dealing with employees that want to bring in their own personal devices? http://searchmidmarketsecurity.techtarget.com/news/article/0,289142,sid198_gci1510987,00.html

    SearchMidmarketSecurityATE150 pointsBadges:
  • Is password hashing really important? Why?

    I've been studying up on my security expertise and I came across an article that talked about the benefits of hashing a password (as a second layer of defense). This is the trouble I'm having with it:Would password hashing only be important if the system is not strong enough to give an intruder...

    ITKE342,785 pointsBadges:
  • Is Firefox a secure place to store a Master Password?

    I have a master password set up on Firefox that is 30 characters long. I'm afraid this is not a very secure set-up. Can someone alleviate my fears or let me know if I should change this ASAP?

    ITKE342,785 pointsBadges:
  • Is a Firewall impervious to Viruses?

    By being connected to the Internet, a computer can be infected with viruses. Why do we put a firewall between the computer and the internet. Isn't the firewall vulnerable to virus attacks?  If not, why not?

    ITKE342,785 pointsBadges:
  • Passwords stored in Plain Text?

    I joined a forum a while back and hadn't returned for a while. In the meantime, I forgot my password. When I returned and clicked their "Request Help With Password link", they sent me my password in Plain Text via email instead of sending me a unique link to reset my password. I would imagine the...

    ITKE342,785 pointsBadges:
  • Virus scanning app for .Net

    I'm trying to write a web application in C+ for .Net to scan user-uploaded files for viruses. Unfortunately, it seems to be beyond my skill level, specifically drafting an API to perform the check programatically.  I could use some help or a good tutorial.

    ITKE342,785 pointsBadges:
  • Data Loss Prevention – Requirements

    Hi, I am currently putting together an options paper for my employer. Does anyone have or could refer me to a concise list of Business and Technical requirements for a DLP solution? Additionally, if anyone has performed a risk assessment prior to deploying a DLP solution, I'd be grateful for any...

    Chestergov5 pointsBadges:
  • AVG is showing an application as a threat

    We have a team working on a project in VB.NET that also includes socket communication and HTTP Listeners. (We have a group of applications that are intercommunicating between Sockets). But a few days ago, we received a message that AVG (anti-virus) was showing one as a threat (executable).How can...

    ITKE342,785 pointsBadges:
  • NFPA 75 update comparisons

    A SearchDataCenter.com reader wrote in with this question: What are the main differences between NFPA 75 1999 Edition and NFPA 75 2003 Edition that would impact the protection design and installation of fire suppression systems as well impact the facility operator?

    Leah Rosin575 pointsBadges:
  • Career change from Java to SAP BI

    hi , I have been working for 3.5 years in Java,J2ee. I was interested in SAP BI, so i joined in a training center and did SAP BI course.. now i joined in a MNC asking for a change in SAP BI..I am having a dilemma whether to stay in Java,J2ee OR move on to SAP BI.. How will be my career in SAP...

    Govind8315 pointsBadges:
  • RPGLE, PROCEDURES

    I want to learn about procedures in RPGLE. I asked some senior of mine about procedures, he answered that for understanding I need to learn modules and all in ILE...kindly guide me what all I need to know before going for procedures, main procedures and sub-procedures. Thanks Durgesh Singh

    Durgesh813370 pointsBadges:
  • RSA and DSA keys: Which one should I choose?

    I've been generating SSH Authentication keys on a Linux/Unix using ssh-keygen. After doing that, I've been given the choice of either creating a RSA or DSA key pair (using -t type).This has me curious: What are the big differences between RSA and DSA keys? Why should I choose one over the other?

    ITKE342,785 pointsBadges:
  • When trying to create an email, the message

    When trying to create a new email or reply to email the following message "message interface has an unknown error".  It tells me to close outlook and reopen, but that doesn't do any good.

    rickercb5 pointsBadges:
  • .pdf conversion to Word – Photo Issue

    Hello, I inserted photos in a Word document. Then I grayed them out so no one could identify who the people are. The document was saved as a .pdf file. Question: If someone was to convert the .pdf back to Word, could they re-create the original photos? Please inform.

    Beautybdy25 pointsBadges:
  • How to plan cloud computing career for Java developer?

    Hi, I am basically Java developer and have 5 years of Java Web Application Development experience. Now I am planning to take my career to the next level by choosing latest technologies like cloud computing and big data. What are the cloud technologies to start with keeping job opportunities in...

    RajuSapphire5 pointsBadges:
  • How save SQL and CL in SAVF!

    Hello, How to save CL and SQL in SAVF, while SAVLIB command these two type of members are not saved. I want to move these from V7R1 to V5R4. Please suggest!

    sgautam11105 pointsBadges:
  • RAID

    What are the different types of RAID?

    ForeignerAmet5 pointsBadges:
  • Recovering data

    Have just formated my PC recently, and later installed the Easy Recovery Data Software. I was hoping that I would be able to retrace some of the files in the hard disk which I had deleted but to no avail. Which type of software would you recomend for recovering lost data.

    nyaga135 pointsBadges:
  • Dear All

    Please help me .what is the t code for work contract (ARC)export to excel

    Pradeep3410 pointsBadges:
  • Port type

    What peripheral port type is expandable using a hub?

    jimmyfogle5 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following