Questions & Answers

  • Audit groups in Active Directory

    I want to audit some actions on my Windows 2008 Server environment. I need to manage some groups, having the complete information on which groups the users have been added before. Do you know that how to get this information on my Active Directory?

    VimyRidge5 pointsBadges:
  • FRP file extension

    I have a file *.FRP. I do not have the program that created the *.frp file on the computer. Can I print the file and how?

    joefitzpatrick5 pointsBadges:
  • CSG and wildcard certificates

    Is it possible to use Wildcard certificates with Citrix Secure Gateway. There is already one on the server but when selecting it for use with the Citrix Secure Gateway, the site claims there is an invalid certificate installed and that it does not match the FQDN.

    Ironballz70 pointsBadges:
  • Artificial Intelligence

    Good day! What are the capabilities of Turing's test? Can I have the answer not later than 1 week? Thanks a lot!

    Romero215 pointsBadges:
  • Run DB Created on *.5 on Client 7

    I am a developer. I support users running Client Version 7. They installed 8.5 on my new laptop. If I develop using Version, will these applications run on Client 7 version of Lotus Notes

    MaryMinc5 pointsBadges:
  • cleaning

    How do I turn off the cleaning mode?

    rlgarrels5 pointsBadges:
  • Security conference speakers

    I just wrote a story on one of the RSA 2005 keynotes. Anyone like to share their opinion on this topic? Frank Abagnale: Catch him if you can http://searchsecurity.techtarget.com/originalContent/0,289142,sid14_gci1035900,00.html The former ID thief made famous in a Leonardo DiCaprio movie wants to...

    ShawnaMcAlearney0 pointsBadges:
  • Security issues going from V5R2 to V5r4

    we upgraded from V5R2 to V5r4 and now I am getting authority problems on any update programs in our custom programing library. User authorities were copied over. That seems fine. Were there any know security problems going from R2 to R4? I get around each instance by changing program to use Adopted...

    Kroeter5 pointsBadges:
  • Under-the-radar enterprise security threats

    Which enterprise security threat do you think has gone under the radar? As an editor on SearchSecurity.com, I'm interested to hear what you think. Our favorite response will win some great, free security training books. http://searchsecurity.techtarget.com/generic/0,295582,sid14_gci1368789,00.html

    WHurley5 pointsBadges:
  • Your mobile device security policy

    From a security perspective, how are you dealing with employees that want to bring in their own personal devices? http://searchmidmarketsecurity.techtarget.com/news/article/0,289142,sid198_gci1510987,00.html

    SearchMidmarketSecurityATE150 pointsBadges:
  • Is password hashing really important? Why?

    I've been studying up on my security expertise and I came across an article that talked about the benefits of hashing a password (as a second layer of defense). This is the trouble I'm having with it:Would password hashing only be important if the system is not strong enough to give an intruder...

    ITKE345,295 pointsBadges:
  • Is Firefox a secure place to store a Master Password?

    I have a master password set up on Firefox that is 30 characters long. I'm afraid this is not a very secure set-up. Can someone alleviate my fears or let me know if I should change this ASAP?

    ITKE345,295 pointsBadges:
  • Is a Firewall impervious to Viruses?

    By being connected to the Internet, a computer can be infected with viruses. Why do we put a firewall between the computer and the internet. Isn't the firewall vulnerable to virus attacks?  If not, why not?

    ITKE345,295 pointsBadges:
  • Passwords stored in Plain Text?

    I joined a forum a while back and hadn't returned for a while. In the meantime, I forgot my password. When I returned and clicked their "Request Help With Password link", they sent me my password in Plain Text via email instead of sending me a unique link to reset my password. I would imagine the...

    ITKE345,295 pointsBadges:
  • Virus scanning app for .Net

    I'm trying to write a web application in C+ for .Net to scan user-uploaded files for viruses. Unfortunately, it seems to be beyond my skill level, specifically drafting an API to perform the check programatically.  I could use some help or a good tutorial.

    ITKE345,295 pointsBadges:
  • Data Loss Prevention – Requirements

    Hi, I am currently putting together an options paper for my employer. Does anyone have or could refer me to a concise list of Business and Technical requirements for a DLP solution? Additionally, if anyone has performed a risk assessment prior to deploying a DLP solution, I'd be grateful for any...

    Chestergov5 pointsBadges:
  • AVG is showing an application as a threat

    We have a team working on a project in VB.NET that also includes socket communication and HTTP Listeners. (We have a group of applications that are intercommunicating between Sockets). But a few days ago, we received a message that AVG (anti-virus) was showing one as a threat (executable).How can...

    ITKE345,295 pointsBadges:
  • NFPA 75 update comparisons

    A SearchDataCenter.com reader wrote in with this question: What are the main differences between NFPA 75 1999 Edition and NFPA 75 2003 Edition that would impact the protection design and installation of fire suppression systems as well impact the facility operator?

    Leah Rosin575 pointsBadges:
  • Career change from Java to SAP BI

    hi , I have been working for 3.5 years in Java,J2ee. I was interested in SAP BI, so i joined in a training center and did SAP BI course.. now i joined in a MNC asking for a change in SAP BI..I am having a dilemma whether to stay in Java,J2ee OR move on to SAP BI.. How will be my career in SAP...

    Govind8315 pointsBadges:
  • RPGLE, PROCEDURES

    I want to learn about procedures in RPGLE. I asked some senior of mine about procedures, he answered that for understanding I need to learn modules and all in ILE...kindly guide me what all I need to know before going for procedures, main procedures and sub-procedures. Thanks Durgesh Singh

    Durgesh813370 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following