Questions & Answers

  • Is there really a security advantage when it comes to spittling a password?

    I've been reading more and more about the LANMAN (LM) hash and I'm having trouble understanding some of the concepts. Is there really any security advantage when it comes to splitting a password, encrypting the two halves separately, and combining the halves to form one hash? Or is it just more of...

    ITKE352,580 pointsBadges:
  • Questions about our single firewall setup

    We are planning to run the following setup: a firewall between our internal zones and the public internet. Each of our trusted zones use a different VLAN with a 3-layered switch while the DMZ zone is on the firewall itself, trunked to a layer 2 switch on the firewall.Would this setup provide...

    ITKE352,580 pointsBadges:
  • Clearing qsysopr message queue

    When we IMPL the operator message queue (QSYSOPR) is clear. Is there a way to prevent this from happening.

    AS400PCFileTransfer16115 pointsBadges:
  • OVRDBF and OPNQRYF

    Can we write OPNQRYF then OVRDBF with SHARE(*YES) and then call a program. Will this program will process only selected records from OPNQRYF or process all records?

    sunnygupta35 pointsBadges:
  • SQL and OPNQRYF

    What we can do in SQL which we cannot do in OPNQRYF

    sunnygupta35 pointsBadges:
  • Licensing/pricing options around Forefront Client Security

    What are the licensing/pricing options around Forefront Client Security? This question is from the Microsoft Live Chat which took place on July 13th.

    ITKE352,580 pointsBadges:
  • Recording failed login attempts in security log for Windows XP SP3

    Can we record any other information in the security log about a failed log in attempt on a Windows XP SP3 desktop? And if so what other information and how can we get at it?

    NewnanIT1,110 pointsBadges:
  • Security certificate in Outlook 2003 and 2007

    I am Running Outlook 2007/Outlook 2003 on Windows 7/XP sp3 systems with pop mail from non exchange local e-mail server. The mail servers security certificate expired. I created a new self signed certificate and installed new server certificate on the clients, however I am getting certificate...

    GaryCarlisle25 pointsBadges:
  • Correspondence form SAP 11

    What's the print program correspondence SAP 11?

    finrisk015 pointsBadges:
  • Add / remove from Distribution group in exchange 2007

    Any one can share some settings where we can get alert or event when user remove / add from distribution group in exchange 2007

    shaikhminhaj5 pointsBadges:
  • AS400 Emulator for Ubuntu

    i need to run mocha as400 emulator in ubuntu. pls suggest me the steps

    thambiyannanvignesh50 pointsBadges:
  • Security implications surrouding outbound SSH traffic

    The school that my son goes to blocks outbound SSH traffic. The users inside the network can't use Port 22 / trying to make a SSH connection through another port is also blocked. The reason I was given for this was because it's putting the users inside the network at risk and would allow port...

    ITKE352,580 pointsBadges:
  • Security Implementation

    With the recent spate of news stories about the apparent information assurance/security failures that have come to light as a result of the events that transpired between Aaron Bar and Anonymous, I’ve been discussing security program implementation with my classmates at the Universtity of...

    Packetsneaker20 pointsBadges:
  • Security tab of partitions………..

    Hi, My OS is winxp pro sp2 and all partitions is NTFS, when I go to security tab of a partition and want to add a user and click the ADD button it says: 'Unable to display the user selection dialog (null)' Could you please help me? Thank you. ---- Regard Mahnaz

    Aliyani265 pointsBadges:
  • User circumventing security

    We have a rogue user who knows more than she should. She can grant herself and other users the authority to access files that are supposed to be secured. Does anyone know of how we can monitor her activity or go back and review what she has done or anything that we can do. We think she may be using...

    Mouse3330 pointsBadges:
  • ChoicePoint CISO says breach not an information security issue

    The CISO of ChoicePoint says the theft of private information on 145,000 from its databases isn't an information security issue because conmen used fraud, not hacking tools or techniques, to get the information. Anyone agree with that? Check it out:...

    Athletica0 pointsBadges:
  • Cross-platform tools for security, monitoring

    What would be some good cross-platform administration tools to use for an environment running Windows OS X and Debian's test release lenny? It is a small business (<200 employees) and the main concerns are being able to perform secure file transfers throughout the system and keeping track of...

    Linux - Ask the Expert270 pointsBadges:
  • How to generate a listing of security information of Win 2003 server folders

    Does somebody know if there is a way to query the Directory database to obtain a listing that includes security and other settings (shares, permissions, etc) of all folders and subfolders of a machine running Win 2003 Server ? Any help or comment will be appreciated.

    carlosdl70,220 pointsBadges:
  • Network and security

    I need a book about network and security... can you recommend a good book where I can read about the network and security ... And much like another book too, which I can use as ITSupport. It may very well be a new book (year) ...

    BookReader5 pointsBadges:
  • Network Security refresher training

    Hello, I was wondering if anyone can refer me to a good and basically free online network auditing, testing, documentation resource available online. thank you.

    Fwguyus5 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following