• Developing an antivirus (efficient):for Windows:Using VC++-2

    I am working on a Project for making an antivirus.I have 2 other project parteners. But we don't have an guidance on how to develop the antivirus.Plz give me any relevent Information on this subject.(like components of AV,Algorithms(efficient),methods,general dection & removal of virus).(Also...

    4238830 pointsBadges:
  • End-user awareness education for company newsletter

    I have been given the task of developing user awareness 1-pager fact sheets to be distributed on a monthly basis in our company newsletter and posted on our intranet. I can write these from scratch but was hoping not to have to reinvent the wheel. Help?

    CalendarGirl0 pointsBadges:
  • Tracking the computer or source of an email

    system: Ex 2003 back-end cluster, Ex 2003 Network Load Balanced Front end. Hi there, A user's account has become comprimised. They have since changed their password, but there are a few mails sent from their account that they did not send. Is it possible to find out the source ie PC hostname or IP...

    Maclanachu0 pointsBadges:
  • Fill out your profile and add a picture to win an iPad

    If you haven't filled out your profile and added your picture, do it now and you could win an iPad. Once you've added your picture and filled out your profile, add a comment to this post to let me know and I'll give you 100 Knowledge Points.  To increase your chances of winning, here's how to...

    EmNichs3,250 pointsBadges:
  • Dissecting applications on a production server

    Several EXE files were installed on a production server. The AV did not detect them as viruses but we do not know what they do. We have copied them to a USB stick and deleted them and all references from production. How can we dissect the applications to see what they did or do?

    NewnanIT1,110 pointsBadges:
  • SAVACTWAIT time on SAVLIB, etc.

    Hi, Has anyone experimented with the SAVACTWAIT time on the SAVLIB command. The default on 120 second seems rather long. What I am looking for is a realistic value based on fact such as that if an object does not become available after 5 second the change that it will become available after 120...

    JohnDavid5 pointsBadges:
  • oracle internet directory application developer’s guide — dbms_ldap_utl sample code doesn’t work

    Hi, all I'm trying to set up Oracle Internet Directory Rel 9. I'm trying to use APIs provided in Application Developer's Guide. I started by copying and trying to run the examples given in the guide. My procedure connects to LDAP, authenticates me, but won't create a user. (Actually, it passes the...

    Paulina0 pointsBadges:
  • ID Theft and National Security

    If it turns out, as I believe, that enemies of the United States are behind a lot of the major ID thefts in the US, that would mean that a lot of money is going to our enemies. Can we therefore surmise that those who mishandle our identity information, by means of their poor stewardship of our...

    InfoSafety75 pointsBadges:
  • Best practices involving admin rights for user on user system

    We are currently in the middle of figuring out the approach we are going to take in regard to a user having admin rights on their system. Typcially we set up a new user as an administrator on their system when they are logged into the domain. They don't have a local admin account on the system,...

    Kevins740 pointsBadges:
  • Encryption of internet password in Domino

    In notes directory, I am changing the internet password of a Person, when i enter password, it gets encrypted first, using @password function and the password is displayed in a encrypted format like this (63E4BD1FEFD8913B15A5A5EF484A3F6B06). But when i try to save the document, it again get...

    srihoneysh15 pointsBadges:
  • accessing a password-protected hd

    Hello everyone. My brother sent me his hard drive becuase his motherboard crapped out and he needs the data from his hard drive. I plugged it into my computer through an IDE connection and i can see most of the files on the computer. However, the data he needs resides within his "documents and...

    Whobettrthankyle0 pointsBadges:
  • moving program code between lpars.

    I was wondering as to the best way to enable my operations staff to move program code from a test lpar to the production lpar. Because of audit requirements I can't have the programers able to move the code themselves.

    Mstallings0 pointsBadges:
  • how about MatriXay?

    I remember seeing MatriXay tool some years ago and it was pretty awesome. And today I was reading the presentation at Blackhat 2006 of MatriXay and found that MatriXay has released 3.6 version. Does anyone know it better? how about it comparing with others?

    Ivyz071710 pointsBadges:
  • Administrative rights in an application

    Good day all, I am new in the application development world as a Business Analyst. Please pardon my ignorance, Kindly attend to my question. What type of access does an administrator/super administrator have on a system/application? i.e. what can be done and not done?

    BUSINESSANALYSIS5 pointsBadges:
  • User Auditing/Journaling

    I'm new to security on the AS/400 (730). We need to have a record of what program a user calls through our ERP system or what objects are changed and who changed them. I've read some on journaling but not sure if that will work for what we need. Suggestions? Thanks Mark

    Hllwyrs0 pointsBadges:
  • Looking for application vulnerability scanner

    My group is considering implementing an application vulnerability scanner to look for security holes in our Web sites. Can you recommend some products? Thanks

    Coder6270 pointsBadges:
  • I’ve been hacked — I think….

    I'm an IT administrator with a little over 500 end users, running Windows 2000 and XP. One of our users is experiencing a problem with her Internet connection suddenly dropping for no apparent reason. When she restarts her computer, everything works fine for awhile, but then the connection drops...

    LMullen0 pointsBadges:
  • Dos attack

    I have been receiving security alert messages from our firewall nearly everyday. e.g TCP Packet - Source:144.120.8.89,39341 Destination:192.168.1.1,25 - [DOS] TCP Packet - Source:210.7.0.36,3473 Destination:210.7.12.23,135 - [DOS] Thu, 2006-10-19 16:30:03 - UDP Packet -...

    92220990 pointsBadges:
  • Looking for Antivirus for Win Storage 2003 x64 server

    Hi, We are looking for an antivirus software that proven to work well with windows storage 2003 x64 server. Our current product works just fine on all other 2003 servers, but it brings down this one from time to time. Thanks, Oksana

    Oksana0 pointsBadges:
  • Penetration Testing.

    Hi!! Good Morning. I have a simple question for you today. I intend to have a penetration testing done for all of my 3 sites - My US Office, My India Office & My US Datacenter. Can you suggest any trustworthy site which can offer me a free reliable scan? Also, I would like to have you suggestion on...

    Nileshroy0 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

Thanks! We'll email you when relevant content is added and updated.

Following