• Encryption by Law? If so, what strength or type?

    Should encryption be explicitly proscribed in Data Security and Provacy legislation like the Massachusetts Data Prvacy Law and the White House cybersecurity initiative? If so, what strength or method? Should there be a minimum strength? What do you think?

    SarahCortes30 pointsBadges:
  • Lotus notes ciphered message & TDES encryption strength

    How I can confirm that cross certify Lotus messages are comply with TDES encryption strength (and the ciphertext form acceptable is encrypted using the KEK)?

    Stero15 pointsBadges:
  • Tracking the computer or source of an email

    system: Ex 2003 back-end cluster, Ex 2003 Network Load Balanced Front end. Hi there, A user's account has become comprimised. They have since changed their password, but there are a few mails sent from their account that they did not send. Is it possible to find out the source ie PC hostname or IP...

    Maclanachu0 pointsBadges:
  • Encrypting a HDD with FIPS-140-2

    Hi all, I know very little about encrypting stuff but is this easyish? Ive been a technician for a while and a customer has asked me to do it for him. Should I send to him a company that do it or can I do myself for him?

    Solsoftcomputers15 pointsBadges:
  • Encryption software for corporate laptops

    Is there free encryption software for our corporate laptops? Does it offer remote wiping capabilities?

    TeachMeIT975 pointsBadges:
  • How do I encrypt an email?

    I want to send an e-mail and I want it encrypted so it can't be sent to others.

    Secure4me10 pointsBadges:
  • Windows server 2003 x2 server VPN encryption

    When doing a Windows Server 2003 to Windows server 2003 vpn what type of encryption should we use being the most restrictive as possible?

    NewnanIT1,110 pointsBadges:
  • IP encryptor configuration

    LAN "A" connected to IP encryptor and connected to LAN "B" with also has an IP encryptor. i.e. we have IPsec VPN from "A" to "B" through MPLS VPN. Can I then connect LAN "A" to LAN "C" that is without IP encryptor via MPLS VPN. How do I configure the IP encryptor at LAN "A" to do that.

    IPencryptor5 pointsBadges:
  • Need Storage Encrypted solution

    Hi, I hope you can give me an option to have ecrypted data at storage level, preferable SAN but if not possible NAS can be adopted. must be 256 bit encrypted, this is requiered for call recording compliance.. thanks in advance

    Xtornet5 pointsBadges:
  • Assigning wireless encryption

    What methods of assigning wireless encryption codes to our users do we have? I want the process to be automated where they connect to the network and see a web page where they can log in and retrieve their codes. What options do I have?

    TeachMeIT975 pointsBadges:
  • Mobile encryption / security

    I'm looking for companies developing next generation mobile security and encryption. Any suggestions?  Thank you, Matt

    Mattperrini15 pointsBadges:
  • Lotus Notes Database encryption

    Is Lotus Notes encryption linked to the computer on which it is installed? I just moved to a new computer and now there is no access to the database.

    MJK265 pointsBadges:
  • Encrypting field in Lotus Notes

    I have a Form with some confidential information in a field. I am sending this document (store form in the document) to a group. Now is there any way that field can be encrypted to certain recipiants of the group. I tried with secretkeyencryption, it worked fine if the document is accessed from...

    SaswatDas5 pointsBadges:
  • Encrypt TCP messages

    What is the best way to encrypt proprietary (non-XML) messages over a TCP socket from the iSeries? I am currently using IBM's QZRDSSRV API's to do the sends and receives and create the socket connections, but those API's don't support encryption.

    baumgardnd50 pointsBadges:
  • How to encrypt spool files ?

    If user have *SPLCTL special authority he can view spool files , using wrksplf outqname option 5 . how to restrict it

    As400e20 pointsBadges:
  • BRMS Encrypted Restore

    Has anyone performed a single library restore from a BRMS encrypted tape on one server to another?  Here's my dilemna...I can encrypt fine and restore partition to partition on the same iSeries server.  However when I try to restore from a partition on another iSeries server I'm unable to...

    dmkuster20 pointsBadges:
  • E-mail hacking

    How can I hack my own e-mail address? Is there software available for this (commercial or freeware)?

    Brainstorm225 pointsBadges:
  • SAVACTWAIT time on SAVLIB, etc.

    Hi, Has anyone experimented with the SAVACTWAIT time on the SAVLIB command. The default on 120 second seems rather long. What I am looking for is a realistic value based on fact such as that if an object does not become available after 5 second the change that it will become available after 120...

    JohnDavid5 pointsBadges:
  • oracle internet directory application developer’s guide — dbms_ldap_utl sample code doesn’t work

    Hi, all I'm trying to set up Oracle Internet Directory Rel 9. I'm trying to use APIs provided in Application Developer's Guide. I started by copying and trying to run the examples given in the guide. My procedure connects to LDAP, authenticates me, but won't create a user. (Actually, it passes the...

    Paulina0 pointsBadges:
  • who is using encryption on my email account

    l think my email is being hacked but not sure l have been recieving encryped emails and want to know is this coming from home or being hacked

    Ally1235 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following