• Need Storage encrypted solution

    Hi, I hope you can give me an option to have encrypted data at storage level, preferable SAN but if not possible NAS can be adopted. Must be 256 bit encrypted, this is required for call recording compliance. Thanks in advance.

    Xtornet5 pointsBadges:
  • File Member Select & Encryption in AS/400

    Two questions here. I have been querying a lot of data out of our database, however I have ran into two issues I'm unsure how to solve. 1.) I'm able to find the referenced table, however this relies on a file. RUNQRY QRY(*LIBL/*N) QRYFILE((SCDATA/SCATRNTL username)) I would like to replicate this...

    kparker25 pointsBadges:
  • Encryption Form SQL Server 2000

    I want to transfer data from one database to another database both the databases are on SQL Server 2000. I want to transfer the data in encryption form. How do I do it? Regards, Sahil

    Maruf245 pointsBadges:
  • BitLocker and Business versions of Windows

    BitLocker drive encryption is intriguing and important, but it's available only in Vista and Win 7 Ultimate and Corporate editions. Since these are the most expensive versions of the OS, most smaller companies use the Business version of Windows--what are some encryption options for them? As a...

    SearchMidmarketSecurityATE150 pointsBadges:
  • AES encyption: More secure than SHA1?

    I know this is more of a curiosity but I wanted to get some expert opinions on this. I recently heard someone recommend stepping up from md5ing (not to SHA1) but to AES encrypting the password, which would use itself as the key. Does anyone have any recommendations on if that would be more or less...

    ITKE351,865 pointsBadges:
  • What is SHA-1 and MD-5 encryption?

    What is SHA-1 and MD-5 encryption?

    Jbt5 pointsBadges:
  • How do I encrypt an email?

    I want to send an e-mail and I want it encrypted so it can't be sent to others.

    Secure4me10 pointsBadges:
  • E-mail hacking

    How can I hack my own e-mail address? Is there software available for this (commercial or freeware)?

    Brainstorm225 pointsBadges:
  • AS400 password encryption

    Hi, how can I verify the password encryption method used by the AS/400/iSeries machine. Thanks.

    Jerico125 pointsBadges:
  • Evaluating security level in our system

    Good day! Could you help detect encryption type (it's very important for us to evaluate security level in our system) Hash code: 5e2f736ea4ab4eb4 Regards, Igor

    technetwin15 pointsBadges:
  • How to encrypt an .exe file into a .Jpeg file?

    Hello guys. I have a question. I want to know how can we encrypt a .exe file into a .JPEG file? Its like, when we open the image file, the .exe file should run on its own. I know there are some complicated encryption methods but are there any simple methods? Can we do that? Are there any threats to...

    Kalyan20088745 pointsBadges:
  • Applying encryption to mobile devices

    How feasible is it to apply encryption to organizational data on mobile devices such as email and other organizational applications? We have a BYOD policy, the question is are we facing any law issues regarding this need mainly in the US and Germany. Thanks.

    OfirNissim5 pointsBadges:
  • Windows encryption tools: How to recover encypted files

    Hi Guys, My name is Werner Kunamwene, a senior sys admin at a company called MobiPay. I encrypted my files not knowing that after I will be required to change my password monthly. I have changed the password so many times that I lost track of the original password when I actually encrypted my...

    Ginela5 pointsBadges:
  • How to Block Chat in the Network

    Dear All, I am wrting this mail to you all, to know if any you have been successfull in Blocking Chats on your networks, and if so, then how have you acheived it? Could you please tell me which Ports to Block for MSN, Yahoo, Rediff, ICQ, Skype. I am using a NetAPPs Net Cache C 1300, and I am trying...

    Komlink0 pointsBadges:
  • Security/ Audit Check list for DB2

    Hi, I'm in the process of hardening the DB2 in Linux and I'm looking for a checklist to help me make sure I don't miss anypoint. Since I'm not an expert on DB2 I would like to have a starting point. I'm looking to make sure I don't leave open doors and also I want ot make sure I don't get an Audit...

    Josec990 pointsBadges:
  • Data vs. perimeter vs. network security

    A short time ago, author Wes Noonan wrote some tips for SearchWindowsSecurity.com about deperimeterization. He explained how security is always pitted against business needs, and perimeters have become porous because businesses require traffic from SMTP, HTTP or VPNs to pass through the firewall....

    RobynLorusso230 pointsBadges:
  • Shouldn’t a person just RSA-encrypt the entire document?

    After doing some research on Security, I've finally figured out how to verify if an email / document was actually sent by the "sender". Here's the process I've figured out:The sender gives their public RSA key to the recipient.The sender also uses SHA1 to hash the document.Then he uses his private...

    ITKE351,865 pointsBadges:
  • Is there really a security advantage when it comes to spittling a password?

    I've been reading more and more about the LANMAN (LM) hash and I'm having trouble understanding some of the concepts. Is there really any security advantage when it comes to splitting a password, encrypting the two halves separately, and combining the halves to form one hash? Or is it just more of...

    ITKE351,865 pointsBadges:
  • User circumventing security

    We have a rogue user who knows more than she should. She can grant herself and other users the authority to access files that are supposed to be secured. Does anyone know of how we can monitor her activity or go back and review what she has done or anything that we can do. We think she may be using...

    Mouse3330 pointsBadges:
  • RSA: Doing a dictionary attack

    In my understanding of learning "Security", I'm looking to learn more about how RSA works. Here's my basic understanding of RSA:Having the public key allows you to encrypt things. Encrypting the same message "Hello" on two different computers using the same public key will produce the same...

    ITKE351,865 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following