• How do I find out what type of encryption is being used?

    I am testing a web application which stores the password in the database in an encrypted format. How do I determine what hashing or encryption is being used?

    ITKE345,295 pointsBadges:
  • Would versioning a file make it less secure?

    I'm using KeePassX as a password manager, and I've stored a KDB file in a Sparkleshare folder to back it up / sync with other devices.But just as a question (with the file being encrypted) if someone stole the file, they would several different versions of the file with minor variations. Would that...

    ITKE345,295 pointsBadges:
  • S/MIME and PGP: How do they differ?

    This is more of a general question but is S/MIME an abstracted system for MIME type encryption (Just as PGP is used more for email)? Why should I choose one over the other? Is it possible both could be used at the same time?

    ITKE345,295 pointsBadges:
  • Corporate laptop security/encryption

    Please can anyone offer any guidance or know what are the best products in the market place for encrypting/securing corporate laptops, preferably the solution should include hard disk wiping.

    Troubleshooter24755 pointsBadges:
  • How to Encrypt a Column in sql server 2000/2005

    How to Encrypt a Column in SQL Server 2000/2005 i.e I need something like this: @OriginalValue = 'Original Value' @EncryptedValue @Key int set @Key = '123#$2hj$dfgh*67kjugd45j45s4agd' --any unique key value for encrypting and decrypting set @EncryptedValue = fn_Encrypt(@OriginalValue, @Key) insert...

    Dot net lerner5 pointsBadges:
  • Unknown Threats

    Apart from honeypots, what are the different methods to find unknown threats which are prevalent? How do I find methods to mitigate them. PS: all the vulnerabilities are known to all the n/w administrators and then can take measures to mitigate attacks but this doesn't happen..Hackers are at least...

    Czarleo0 pointsBadges:
  • FTP from IFS of an AS/400

    Hi, I need to FTP from IFS of an AS/400 to a remote server using encrypted/secure transfer. Destination server may not be necessarily an AS/400. I am able to transfer the reports simply, but it has to be encrypted/secure.

    DeepikaR115 pointsBadges:
  • VPN configuration

    Dear members, I have a Cisco ASA 5520 firewall. I want connected to another location for VPN. The another end have only for Jupiter ns-25 devise. Its possible to connect VPN. What is the iOS that will be required for both end? What are the authentication and encryption methods will be support?...

    Franklinlobo5 pointsBadges:
  • Encryption

    My son tells me that my Charter.net email does not use encryption. Is this more common or less common? Lee

    autonut15 pointsBadges:
  • Encryption by Law? If so, what strength or type?

    Should encryption be explicitly proscribed in Data Security and Privacy legislation like the Massachusetts Data Prvacy Law and the White House cybersecurity initiative? If so, what strength or method? Should there be a minimum strength? What do you think? Troy Tate, thanks, are you recommending the...

    SarahCortes30 pointsBadges:
  • vpn through s-box firewall of checkpoint

    i'm try to create a vpn from the internet to my "small buisness server 2003" that act as vpn server without any luck, if i try to connect to my server from the internal network it's work just fine, iv'e mapped the correct ports according to the microsoft article that say to forward port 1723 and 47...

    Drorbenyosef5 pointsBadges:
  • Developing an antivirus (efficient):for Windows:Using VC++

    I am working on a Project for making an antivirus.I have 2 other project parteners. But we don't have an guidance on how to develop the antivirus.Plz give me any relevent Information on this subject.(like components of AV,Algorithms(efficient),methods,general detection & removal of virus).(Also...

    4238830 pointsBadges:
  • Developing an antivirus (efficient):for Windows:Using VC++-2

    I am working on a Project for making an antivirus.I have 2 other project parteners. But we don't have an guidance on how to develop the antivirus.Plz give me any relevent Information on this subject.(like components of AV,Algorithms(efficient),methods,general dection & removal of virus).(Also...

    4238830 pointsBadges:
  • Internet Explorer vs. Firefox

    Hello, I'm the Assistant Editor on SearchWindowsSecurity.com. I'm looking to start a discussion about what browser people are using and why. Also, is anyone considering switching from IE to Firefox, or are your plans to stay with IE? Here's some food for thought... As of Feb. 2005, an estimated 35...

    LMullen0 pointsBadges:
  • End-user awareness education for company newsletter

    I have been given the task of developing user awareness 1-pager fact sheets to be distributed on a monthly basis in our company newsletter and posted on our intranet. I can write these from scratch but was hoping not to have to reinvent the wheel. Help?

    CalendarGirl0 pointsBadges:
  • Which encryption algorithm is the most recommended by the PCI standard?

    Does anyone know if AKA ver 2 protocol is PCI compliance?

    Keren5 pointsBadges:
  • Link Access automated form to separate outlook mailbox

    I want to email a form from access to 5,000+ indiviudals. This form contains sensitive data so I want to encrypt an outlook mailbox (we'll call it mailbox B) for the purpose of this correspondance. The outlook mailbox is separate from my personal mailbox (mailbox A). The problem I'm having is that...

    KNK5 pointsBadges:
  • Windows Server 2008 encryption

    Can I encrypt data over the wire between local Windows Server 2008 local servers?

    NewnanIT1,110 pointsBadges:
  • Encrypting DHCP requests and traffic

    Is it possible to encrypt DHCP requests and traffic?

    Troubleshooter24755 pointsBadges:
  • Weaknesses of Cloud Computing

    I know there is a lot of buzz around cloud computing, but the weaknesses seem to get no press. My greatest concerns are encryption and key management. What are the other downsides you've discovered?

    ITKE345,295 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following