• Dissecting applications on a production server

    Several EXE files were installed on a production server. The AV did not detect them as viruses but we do not know what they do. We have copied them to a USB stick and deleted them and all references from production. How can we dissect the applications to see what they did or do?

    NewnanIT1,110 pointsBadges:
  • SAVACTWAIT time on SAVLIB, etc.

    Hi, Has anyone experimented with the SAVACTWAIT time on the SAVLIB command. The default on 120 second seems rather long. What I am looking for is a realistic value based on fact such as that if an object does not become available after 5 second the change that it will become available after 120...

    JohnDavid5 pointsBadges:
  • oracle internet directory application developer’s guide — dbms_ldap_utl sample code doesn’t work

    Hi, all I'm trying to set up Oracle Internet Directory Rel 9. I'm trying to use APIs provided in Application Developer's Guide. I started by copying and trying to run the examples given in the guide. My procedure connects to LDAP, authenticates me, but won't create a user. (Actually, it passes the...

    Paulina0 pointsBadges:
  • ID Theft and National Security

    If it turns out, as I believe, that enemies of the United States are behind a lot of the major ID thefts in the US, that would mean that a lot of money is going to our enemies. Can we therefore surmise that those who mishandle our identity information, by means of their poor stewardship of our...

    InfoSafety75 pointsBadges:
  • Network Connection Freezes

    For some reason, at random, among 20 PCs on my network, in the morning or during the day, the network connection stops responding for both intranet and internet communications. The only solution thus far is to remove the NIC from the Device Manager, reboot the PC, and let Windows XP Pro find the...

    DboiSOBE0 pointsBadges:
  • Best practices involving admin rights for user on user system

    We are currently in the middle of figuring out the approach we are going to take in regard to a user having admin rights on their system. Typcially we set up a new user as an administrator on their system when they are logged into the domain. They don't have a local admin account on the system,...

    Kevins740 pointsBadges:
  • Encryption of internet password in Domino

    In notes directory, I am changing the internet password of a Person, when i enter password, it gets encrypted first, using @password function and the password is displayed in a encrypted format like this (63E4BD1FEFD8913B15A5A5EF484A3F6B06). But when i try to save the document, it again get...

    srihoneysh15 pointsBadges:
  • accessing a password-protected hd

    Hello everyone. My brother sent me his hard drive becuase his motherboard crapped out and he needs the data from his hard drive. I plugged it into my computer through an IDE connection and i can see most of the files on the computer. However, the data he needs resides within his "documents and...

    Whobettrthankyle0 pointsBadges:
  • moving program code between lpars.

    I was wondering as to the best way to enable my operations staff to move program code from a test lpar to the production lpar. Because of audit requirements I can't have the programers able to move the code themselves.

    Mstallings0 pointsBadges:
  • how about MatriXay?

    I remember seeing MatriXay tool some years ago and it was pretty awesome. And today I was reading the presentation at Blackhat 2006 of MatriXay and found that MatriXay has released 3.6 version. Does anyone know it better? how about it comparing with others?

    Ivyz071710 pointsBadges:
  • Administrative rights in an application

    Good day all, I am new in the application development world as a Business Analyst. Please pardon my ignorance, Kindly attend to my question. What type of access does an administrator/super administrator have on a system/application? i.e. what can be done and not done?

    BUSINESSANALYSIS5 pointsBadges:
  • User Auditing/Journaling

    I'm new to security on the AS/400 (730). We need to have a record of what program a user calls through our ERP system or what objects are changed and who changed them. I've read some on journaling but not sure if that will work for what we need. Suggestions? Thanks Mark

    Hllwyrs0 pointsBadges:
  • Looking for application vulnerability scanner

    My group is considering implementing an application vulnerability scanner to look for security holes in our Web sites. Can you recommend some products? Thanks

    Coder6270 pointsBadges:
  • I’ve been hacked — I think….

    I'm an IT administrator with a little over 500 end users, running Windows 2000 and XP. One of our users is experiencing a problem with her Internet connection suddenly dropping for no apparent reason. When she restarts her computer, everything works fine for awhile, but then the connection drops...

    LMullen0 pointsBadges:
  • Dos attack

    I have been receiving security alert messages from our firewall nearly everyday. e.g TCP Packet - Source:144.120.8.89,39341 Destination:192.168.1.1,25 - [DOS] TCP Packet - Source:210.7.0.36,3473 Destination:210.7.12.23,135 - [DOS] Thu, 2006-10-19 16:30:03 - UDP Packet -...

    92220990 pointsBadges:
  • Looking for Antivirus for Win Storage 2003 x64 server

    Hi, We are looking for an antivirus software that proven to work well with windows storage 2003 x64 server. Our current product works just fine on all other 2003 servers, but it brings down this one from time to time. Thanks, Oksana

    Oksana0 pointsBadges:
  • Penetration Testing.

    Hi!! Good Morning. I have a simple question for you today. I intend to have a penetration testing done for all of my 3 sites - My US Office, My India Office & My US Datacenter. Can you suggest any trustworthy site which can offer me a free reliable scan? Also, I would like to have you suggestion on...

    Nileshroy0 pointsBadges:
  • Selecting an area within security to start

    Hi, I'm studying for an MSc in Information Security from Royal Holloway University of London, I have a B.Engg. degree in computers and a PG Diploma in Networking and Communication as well as the CCSA and CCNA. I'm also studying for the CISSP. Now, with all these qualifications, could you please...

    Secmax0 pointsBadges:
  • IT Security

    With all the talk about security certifications and working in IT security being hot right now and in the future, I was wondering if it would make more sense to try and get the Security + certification before trying to get another IT certification such as the MCSA (Microsoft Certified Systems...

    Davemd10 pointsBadges:
  • Best authentication method

    I'm researching authentication methods, trying to determine what method is best for allowing customers to make payments online. Which, in your opinion, is best?

    Coder6270 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following