• Windows server 2003 x2 server VPN encryption

    When doing a Windows Server 2003 to Windows server 2003 vpn what type of encryption should we use being the most restrictive as possible?

    NewnanIT1,110 pointsBadges:
  • IP encryptor configuration

    LAN "A" connected to IP encryptor and connected to LAN "B" with also has an IP encryptor. i.e. we have IPsec VPN from "A" to "B" through MPLS VPN. Can I then connect LAN "A" to LAN "C" that is without IP encryptor via MPLS VPN. How do I configure the IP encryptor at LAN "A" to do that.

    IPencryptor5 pointsBadges:
  • Assigning wireless encryption

    What methods of assigning wireless encryption codes to our users do we have? I want the process to be automated where they connect to the network and see a web page where they can log in and retrieve their codes. What options do I have?

    TeachMeIT975 pointsBadges:
  • Mobile encryption / security

    I'm looking for companies developing next generation mobile security and encryption. Any suggestions?  Thank you, Matt

    Mattperrini15 pointsBadges:
  • Lotus Notes Database encryption

    Is Lotus Notes encryption linked to the computer on which it is installed? I just moved to a new computer and now there is no access to the database.

    MJK265 pointsBadges:
  • Encrypting field in Lotus Notes

    I have a Form with some confidential information in a field. I am sending this document (store form in the document) to a group. Now is there any way that field can be encrypted to certain recipiants of the group. I tried with secretkeyencryption, it worked fine if the document is accessed from...

    SaswatDas5 pointsBadges:
  • Encrypt TCP messages

    What is the best way to encrypt proprietary (non-XML) messages over a TCP socket from the iSeries? I am currently using IBM's QZRDSSRV API's to do the sends and receives and create the socket connections, but those API's don't support encryption.

    baumgardnd50 pointsBadges:
  • How to encrypt spool files ?

    If user have *SPLCTL special authority he can view spool files , using wrksplf outqname option 5 . how to restrict it

    As400e20 pointsBadges:
  • BRMS Encrypted Restore

    Has anyone performed a single library restore from a BRMS encrypted tape on one server to another?  Here's my dilemna...I can encrypt fine and restore partition to partition on the same iSeries server.  However when I try to restore from a partition on another iSeries server I'm unable to...

    dmkuster20 pointsBadges:
  • SAVACTWAIT time on SAVLIB, etc.

    Hi, Has anyone experimented with the SAVACTWAIT time on the SAVLIB command. The default on 120 second seems rather long. What I am looking for is a realistic value based on fact such as that if an object does not become available after 5 second the change that it will become available after 120...

    JohnDavid5 pointsBadges:
  • oracle internet directory application developer’s guide — dbms_ldap_utl sample code doesn’t work

    Hi, all I'm trying to set up Oracle Internet Directory Rel 9. I'm trying to use APIs provided in Application Developer's Guide. I started by copying and trying to run the examples given in the guide. My procedure connects to LDAP, authenticates me, but won't create a user. (Actually, it passes the...

    Paulina0 pointsBadges:
  • who is using encryption on my email account

    l think my email is being hacked but not sure l have been recieving encryped emails and want to know is this coming from home or being hacked

    Ally1235 pointsBadges:
  • ID Theft and National Security

    If it turns out, as I believe, that enemies of the United States are behind a lot of the major ID thefts in the US, that would mean that a lot of money is going to our enemies. Can we therefore surmise that those who mishandle our identity information, by means of their poor stewardship of our...

    InfoSafety75 pointsBadges:
  • Network Connection Freezes

    For some reason, at random, among 20 PCs on my network, in the morning or during the day, the network connection stops responding for both intranet and internet communications. The only solution thus far is to remove the NIC from the Device Manager, reboot the PC, and let Windows XP Pro find the...

    DboiSOBE0 pointsBadges:
  • Best practices involving admin rights for user on user system

    We are currently in the middle of figuring out the approach we are going to take in regard to a user having admin rights on their system. Typcially we set up a new user as an administrator on their system when they are logged into the domain. They don't have a local admin account on the system,...

    Kevins740 pointsBadges:
  • Encryption of internet password in Domino

    In notes directory, I am changing the internet password of a Person, when i enter password, it gets encrypted first, using @password function and the password is displayed in a encrypted format like this (63E4BD1FEFD8913B15A5A5EF484A3F6B06). But when i try to save the document, it again get...

    srihoneysh15 pointsBadges:
  • Tape drive showing Interface error

    Hi. . . I have this tape drive attached to an EKM server for encryption is showing this error everytime I do a DUPTAP Message . . . . : Condition of source/sink object TAP05 not valid. Cause . . . . . : The condition of the source/sink object is not valid. The affected operation value is X'4001'...

    Jerico125 pointsBadges:
  • accessing a password-protected hd

    Hello everyone. My brother sent me his hard drive becuase his motherboard crapped out and he needs the data from his hard drive. I plugged it into my computer through an IDE connection and i can see most of the files on the computer. However, the data he needs resides within his "documents and...

    Whobettrthankyle0 pointsBadges:
  • internal LTO4 tape drive

    can an internal LTO4 tape drive support encryption on i 8203 power6 server?

    Campanaj5 pointsBadges:
  • Encryption: An “unapproachable” subject?

    In a recent SearchMidmarketSecurity.com article, contributor Mike Chapple says, "Unfortunately, many security practitioners don't fully understand encryption due to the technology's ill-deserved reputation as the unapproachable domain of mathematicians and cryptographers." Do you agree? And what...

    SearchMidmarketSecurityATE150 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following