• Compliance

    Within the GRC cycle, how can IT security compliance be best described?

    gbwilson10 pointsBadges:
  • EXCED 13

    Which brand is EXCEED 13 , Hummingbird or Open Text

    OTAZKY15 pointsBadges:
  • Windows Foundation Server 2008 R2 License and Domain issues

    We have joined 2 Foundation servers to an existing domain as members in a Forest to a Server 2008 R2 Standard DC as the parent.Regularly on startup we get a message "Check for Licensing Compliance is Incomplete".I need to know how serious this error is? and are we going to experience problems if...

    GazzaBot10 pointsBadges:
  • Developing an antivirus (efficient):for Windows:Using VC++

    I am working on a Project for making an antivirus.I have 2 other project parteners. But we don't have an guidance on how to develop the antivirus.Plz give me any relevent Information on this subject.(like components of AV,Algorithms(efficient),methods,general detection & removal of virus).(Also...

    4238830 pointsBadges:
  • Developing an antivirus (efficient):for Windows:Using VC++-2

    I am working on a Project for making an antivirus.I have 2 other project parteners. But we don't have an guidance on how to develop the antivirus.Plz give me any relevent Information on this subject.(like components of AV,Algorithms(efficient),methods,general dection & removal of virus).(Also...

    4238830 pointsBadges:
  • Internet Explorer vs. Firefox

    Hello, I'm the Assistant Editor on SearchWindowsSecurity.com. I'm looking to start a discussion about what browser people are using and why. Also, is anyone considering switching from IE to Firefox, or are your plans to stay with IE? Here's some food for thought... As of Feb. 2005, an estimated 35...

    LMullen0 pointsBadges:
  • Which encryption algorithm is the most recommended by the PCI standard?

    Does anyone know if AKA ver 2 protocol is PCI compliance?

    Keren5 pointsBadges:
  • Agile SDLC SOX Controls

    We are implementing Agile SDLC in our company. Has anybody identified Agile SDLC controls that are tested as part of their SOX complinance program? Would appreciate any examples of controls that you can offer

    Rcneville5 pointsBadges:
  • PCI Compliance for hosted merchant systems

    We contract with an outside merchant who hosts a software system that is accessable through a secure login on select, internal personal computers. We contract as agents of that merchant to operate their system as a point of sale for services. Payment for those services can be by credit card and CC...

    CPO5 pointsBadges:
  • Active Dir. Web Based Password Reset Tool?

    We run a native 2003 Active Directory. We have many remote users who have an AD account (without an Exchange account). Quite often we get emailed from users who are requesting password resets, or account unlocks (since we have a 5-try account lockout policy in effect on the domain). Obviously,...

    GregNottage0 pointsBadges:
  • virus malware spyware

    I want to how to conduct a risk assessment to protect our pcs, networks

    M20085 pointsBadges:
  • checklist for moving datacenter

    Hello. Our company have a plan to move datacenter in a month and my boss ordered me to make out the plan for it. But I don't know how to do it, especially I have no idea about what I should check for moving datacenter. Help me! How can I get the process, checklist.... for moving datacenter?

    Chosang10 pointsBadges:
  • PCI compliance 1.4(b) on personal firewalls

    Requirement 1.4(b) asks if personal firewall software is not alterable by employee-owned computer users. If we allow employees to alter their personal firewall software settings, what other compensating controls could we implement in order to meet satisfy the objective of this requirement?

    Eb100255 pointsBadges:
  • How to Monitor File Changes done thru STRSQL

    I need a solution for monitoring file changes done by programmers using the STRSQL from a command line for SOX purposes.

    poorboy01105 pointsBadges:
  • Hercules 4.5 Compliance Check

    We currently use Hercules 4.5 to back up our SCCM for audits and remediations.  When using Hercules audit, the customer receives a pop-up in the bottom right hand of their screen telling them that a compliance check is about to be performed on their system.  The reaction of the customers are...

    Harisheldon19601,420 pointsBadges:
  • PCI-DSS Scope minimization

    i am trying to prepare a methodology on how to implement PCI-DSS.i prepared my scope but now i want to know what are the exact steps which one would have to follow to SHRINK OR MINIMIZE SCOPE. can someone help me. Thank you

    Ritik5 pointsBadges:
  • IT sites SOX as reason we can not diag. Dropped packet problem in setting up IP Phone system.

    We have wasted 20 hours proving to another IT company that the issues are in their firewall.  They will not let us even see what they are doing...quoting SOX as the reason.  We have finally told the customer that unless we can not see their configuration, they will need to purchase another...

    TNTGRP15 pointsBadges:
  • Power Point 2003 vs. 2007 PCI DSS Compliance

    Would migrating to Power Point Viewer 2007 change PCI DSS compliance in any way if all patches were applied to 2007?  i.e., does the newer version bring anything like ActiveX into the picture?

    mperry2915 pointsBadges:
  • Data Protection Act [UK]

    Hi, Can anyone point me in the direction of an up-to-date summary [in layman's terms] of this act? Thanks in advance

    Mattaux0 pointsBadges:
  • Adding NICs to my machine to run VMs from my Windows 7 computer

    If I want to run multiple VMs from my Windows 7 computer, I will need 6 NICs. How can I add 6 NICs to my machine? Are there ethernet banks or a single PCI card with lots of ports?

    Troubleshooter24755 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following