1
  • OST files

    We are migrating users from one exchange server to another. the users sit in remote sites and use very slow links to connect to the exchange server. Is it possible to use the old ost on the pc for the new exchange server instead of recreating the ost with the new exchange server, which can take...

    PaulBone10 pointsBadges:
  • Further enhancing public-private key encryption/decryption

    I am a volunteer with a non-profit organization. Part of my proposal entails encrypting and decrypting Personal Identifying Information, its storage on a database, and transfer over the internet. I would like to use or extend software code that improves upon the public-key and private-key paradigm....

    Pja15 pointsBadges:
  • Backtrack 5

    I used BackTrack to find a wireless web encryption key, the key is found when I enter it and I omitted the :'s it give me unable to get IP address ,although I entered the key using HEX web, so does the key mismatch?

    mkarmi35 pointsBadges:
  • Encrypting wireless router

    What steps should I follow in encrypting my linksys wireless router? My previous password had both letters and numbers.

    Windman665 pointsBadges:
  • Weaknesses of Cloud Computing

    I know there is a lot of buzz around cloud computing, but the weaknesses seem to get no press. My greatest concerns are encryption and key management. What are the other downsides you've discovered?

    ITKE351,865 pointsBadges:
  • Assigning wireless encryption

    What methods of assigning wireless encryption codes to our users do we have? I want the process to be automated where they connect to the network and see a web page where they can log in and retrieve their codes. What options do I have?

    TeachMeIT975 pointsBadges:
  • Lotus Notes Database encryption

    Is Lotus Notes encryption linked to the computer on which it is installed? I just moved to a new computer and now there is no access to the database.

    MJK265 pointsBadges:
  • Encryption: An “unapproachable” subject?

    In a recent SearchMidmarketSecurity.com article, contributor Mike Chapple says, "Unfortunately, many security practitioners don't fully understand encryption due to the technology's ill-deserved reputation as the unapproachable domain of mathematicians and cryptographers." Do you agree? And what...

    SearchMidmarketSecurityATE150 pointsBadges:
  • SMB encryption options and vendor vetting

    From a reader: With the Nevada data protection regulation and upcoming Massachusetts data protection law, we're looking for a checklist of encryption issues we should raise as we begin to look at vendors. Also: What are some red flags to look for as we talk/negotiate with vendors? What are...

    SearchMidmarketSecurityATE150 pointsBadges:
  • Encryption key management

    Looking for info on encryption of data for backup purposes, either at the tape drive, VTL, SAN switch or some type of appliance in the backup path. Encryption Key management is more critical than the encryption solution. This request for help was originally submitted to the Research Assistant on...

    ResearchAssistant855 pointsBadges:
1

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following