Questions & Answers

  • Security firewall in routers

    How do I disable the firewall in the Ericson w35 router because it blocking some of my programs from working properly. It says my NAT port is blocked.

    Jaw645 pointsBadges:
  • Outlook-style user interface in VB 2005

    I want to create an Outlook-style user interface in VB 2005. Anybody to guide me or provide sample code for me? Thanks. Goodshow

    Goodshow5 pointsBadges:
  • Sparklines in Word or Excel

    Has anyone ever used sparklines in Word or Excel (both Office 2003 versions? What tool(s) did you use? What did you find best to use to summarize large numbers of data points (>25,000)? Thanks for the assistance.

    Labnuke9932,960 pointsBadges:
  • Wireless and the perfect tool set

    Okay, my home network is setup so that I have my two desktops plugged in via ethernet and two laptops accessing my router via wireless. I'm using all sorts of programs at the moment to analyse my network and monitor IP addresses, etc. But, I still find my network attached to a MAC address other...

    Alucard5 pointsBadges:
  • Microsoft Communicator 2005 Basics

    Microsoft Office Communicator 2005 installed on my computer. Does this program automatically save conversations or do I have to set that up? If automatically stored, where, exactly are they? I don't have a third party software for this. Outlook 2007 is installed on my computer, but I cannot find...

    ReallyNeedITHelp5 pointsBadges:
  • lsass CPU after enabling SSL

    lsass.exe utilization is more CPU after enabling SSL?

    Aryavrat15 pointsBadges:
  • Windows XP Pro 64-bit only showing 3 of out 4 GB of RAM

    Hi, I have recently installed an extra 1GB of RAM. When I boot up it only show's 3GB in BIOS. This is also the same when i view my system properties. I have tried the basic tests like removing one of the original RAM modules and replacing it with the new one to make sure it is working, it does....

    Sebmeikle15 pointsBadges:
  • Windows utility

    Which Windows utility shows the devices that an IP packet travels through from source to destination?

    Drecoma5 pointsBadges:
  • Can you provide an example of a one-time password algorithm?

    I'm trying to develop a website, along with a corresponding helper program (that would be installed on a user computer). Both the website and the program will communicate with each other through AJAX but I know it will be a huge security risk other web pages can send requests to the program. I need...

    ITKE354,330 pointsBadges:
  • Is it ok to use a weak password as long as I have two-factor authentication?

    When it comes to passwords, I'm pretty strong. I never reuse passwords across sites and I try to use two-factor authentication when it's available. But I do realize that typing all those passwords is a problem. A good friend of mine asked me why I don't use a weak password when two-factor...

    ITKE354,330 pointsBadges:
  • My key fob system has been working fine. Is there any need to upgrade?

    I've noticed that my key fob system has been acting slowly but is still working pretty good. Should I upgrade or hold off?

    ITKE354,330 pointsBadges:
  • Are there any particular multifactor authentication issues to consider in the healthcare industry?

    A friend of mine is getting into the healthcare industry has some concerns, particularly when it comes to security. Are there any particular authentication issues that he needs to know about in the healthcare industry?

    ITKE354,330 pointsBadges:
  • How can I allow end users to transfer security groups in Active Directory?

    In our organization, our users logon to their desktops with Active Directory and access SharePoint using Windows authentication. But many of our users frequently change teams, so their access to their old SharePoint team site should be removed. Our maintenance team is refusing to setup groups for...

    ITKE354,330 pointsBadges:
  • How do I generate a Google application-specific password from a shell script?

    I've recently enabled two-factor authentication on Google, but no my Google export scripts aren't working. My computer is verified and trusted but, for some reason, the scripts are not. Basically, every time the CRON job is run, I keep getting this 'Google verification code' and the script fails....

    ITKE354,330 pointsBadges:
  • Sending a text message from the AS/400

    Is there a way to send a text message to a cell phone from the AS/400 preferably without having to purchase some third party software?

    ElTerrifico620 pointsBadges:
  • Changing default password to expire the password when users log in

    I want to change default password to expire the password when users log in. How do I accomplish this?

    DCORDERO4720 pointsBadges:
  • What’s the best way to generate a cryptographically secure token?

    In order to generate a 32 character token for access to our API, we've been using this: $token = md5(uniqid(mt_rand(), true)); But someone told us that this isn't the best way to secure it and that we should use this instead: openssl_random_pseudo_bytes What's the best way here? Thanks for the help.

    ITKE354,330 pointsBadges:
  • How do I set up a PHP password recovery script with a 24-hour token?

    I'm trying to set up a PHP password recovery script, that would use a token but would expire after 24 hours. I'm having trouble setting it up. All I have right now is SHA1 encrypted user passwords but I really need to append a token to the URL that gets sent to the user when they request a password...

    ITKE354,330 pointsBadges:
  • What is the correct way to log out of an HTTP authentication-protected folder?

    Does anyone know of the right way to log out of HTTP authentication protected folder? I understand there are workarounds but they can be dangerous too. Does anyone have a good solution?

    ITKE354,330 pointsBadges:
  • What are the Identity Access Management options in Windows Azure?

    I currently have a mobile application that's been using AWS's IAM infrastructure that allows me to provide temporary access tokens to anonymous mobile devices. This allows them to run queries against AWS services from a mobile device. Would anyone happen to know if Windows Azure has a drop-in...

    ITKE354,330 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following