• FTP from IFS of an AS/400

    Hi, I need to FTP from IFS of an AS/400 to a remote server using encrypted/secure transfer. Destination server may not be necessarily an AS/400. I am able to transfer the reports simply, but it has to be encrypted/secure.

    DeepikaR115 pointsBadges:
  • VPN configuration

    Dear members, I have a Cisco ASA 5520 firewall. I want connected to another location for VPN. The another end have only for Jupiter ns-25 devise. Its possible to connect VPN. What is the iOS that will be required for both end? What are the authentication and encryption methods will be support?...

    Franklinlobo5 pointsBadges:
  • Encryption

    My son tells me that my Charter.net email does not use encryption. Is this more common or less common? Lee

    autonut15 pointsBadges:
  • Encryption by Law? If so, what strength or type?

    Should encryption be explicitly proscribed in Data Security and Privacy legislation like the Massachusetts Data Prvacy Law and the White House cybersecurity initiative? If so, what strength or method? Should there be a minimum strength? What do you think? Troy Tate, thanks, are you recommending the...

    SarahCortes30 pointsBadges:
  • vpn through s-box firewall of checkpoint

    i'm try to create a vpn from the internet to my "small buisness server 2003" that act as vpn server without any luck, if i try to connect to my server from the internal network it's work just fine, iv'e mapped the correct ports according to the microsoft article that say to forward port 1723 and 47...

    Drorbenyosef5 pointsBadges:
  • Developing an antivirus (efficient):for Windows:Using VC++

    I am working on a Project for making an antivirus.I have 2 other project parteners. But we don't have an guidance on how to develop the antivirus.Plz give me any relevent Information on this subject.(like components of AV,Algorithms(efficient),methods,general detection & removal of virus).(Also...

    4238830 pointsBadges:
  • Developing an antivirus (efficient):for Windows:Using VC++-2

    I am working on a Project for making an antivirus.I have 2 other project parteners. But we don't have an guidance on how to develop the antivirus.Plz give me any relevent Information on this subject.(like components of AV,Algorithms(efficient),methods,general dection & removal of virus).(Also...

    4238830 pointsBadges:
  • Internet Explorer vs. Firefox

    Hello, I'm the Assistant Editor on SearchWindowsSecurity.com. I'm looking to start a discussion about what browser people are using and why. Also, is anyone considering switching from IE to Firefox, or are your plans to stay with IE? Here's some food for thought... As of Feb. 2005, an estimated 35...

    LMullen0 pointsBadges:
  • End-user awareness education for company newsletter

    I have been given the task of developing user awareness 1-pager fact sheets to be distributed on a monthly basis in our company newsletter and posted on our intranet. I can write these from scratch but was hoping not to have to reinvent the wheel. Help?

    CalendarGirl0 pointsBadges:
  • Which encryption algorithm is the most recommended by the PCI standard?

    Does anyone know if AKA ver 2 protocol is PCI compliance?

    Keren5 pointsBadges:
  • Link Access automated form to separate outlook mailbox

    I want to email a form from access to 5,000+ indiviudals. This form contains sensitive data so I want to encrypt an outlook mailbox (we'll call it mailbox B) for the purpose of this correspondance. The outlook mailbox is separate from my personal mailbox (mailbox A). The problem I'm having is that...

    KNK5 pointsBadges:
  • Windows Server 2008 encryption

    Can I encrypt data over the wire between local Windows Server 2008 local servers?

    NewnanIT1,110 pointsBadges:
  • Encrypting DHCP requests and traffic

    Is it possible to encrypt DHCP requests and traffic?

    Troubleshooter24755 pointsBadges:
  • Encrypting traffic and data

    Can we encrypt the traffic and data from HR's computer to the CEO and nothing else on the network? We are running Windows 7 on the desktop.

    TeachMeIT975 pointsBadges:
  • Weaknesses of Cloud Computing

    I know there is a lot of buzz around cloud computing, but the weaknesses seem to get no press. My greatest concerns are encryption and key management. What are the other downsides you've discovered?

    ITKE352,420 pointsBadges:
  • Encryption by Law? If so, what strength or type?

    Should encryption be explicitly proscribed in Data Security and Provacy legislation like the Massachusetts Data Prvacy Law and the White House cybersecurity initiative? If so, what strength or method? Should there be a minimum strength? What do you think?

    SarahCortes30 pointsBadges:
  • Lotus notes ciphered message & TDES encryption strength

    How I can confirm that cross certify Lotus messages are comply with TDES encryption strength (and the ciphertext form acceptable is encrypted using the KEK)?

    Stero15 pointsBadges:
  • Tracking the computer or source of an email

    system: Ex 2003 back-end cluster, Ex 2003 Network Load Balanced Front end. Hi there, A user's account has become comprimised. They have since changed their password, but there are a few mails sent from their account that they did not send. Is it possible to find out the source ie PC hostname or IP...

    Maclanachu0 pointsBadges:
  • Encrypting a HDD with FIPS-140-2

    Hi all, I know very little about encrypting stuff but is this easyish? Ive been a technician for a while and a customer has asked me to do it for him. Should I send to him a company that do it or can I do myself for him?

    Solsoftcomputers15 pointsBadges:
  • Encryption software for corporate laptops

    Is there free encryption software for our corporate laptops? Does it offer remote wiping capabilities?

    TeachMeIT975 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following