• vpn through s-box firewall of checkpoint

    i'm try to create a vpn from the internet to my "small buisness server 2003" that act as vpn server without any luck, if i try to connect to my server from the internal network it's work just fine, iv'e mapped the correct ports according to the microsoft article that say to forward port 1723 and 47...

    Drorbenyosef5 pointsBadges:
  • Developing an antivirus (efficient):for Windows:Using VC++

    I am working on a Project for making an antivirus.I have 2 other project parteners. But we don't have an guidance on how to develop the antivirus.Plz give me any relevent Information on this subject.(like components of AV,Algorithms(efficient),methods,general detection & removal of virus).(Also...

    4238830 pointsBadges:
  • Developing an antivirus (efficient):for Windows:Using VC++-2

    I am working on a Project for making an antivirus.I have 2 other project parteners. But we don't have an guidance on how to develop the antivirus.Plz give me any relevent Information on this subject.(like components of AV,Algorithms(efficient),methods,general dection & removal of virus).(Also...

    4238830 pointsBadges:
  • End-user awareness education for company newsletter

    I have been given the task of developing user awareness 1-pager fact sheets to be distributed on a monthly basis in our company newsletter and posted on our intranet. I can write these from scratch but was hoping not to have to reinvent the wheel. Help?

    CalendarGirl0 pointsBadges:
  • Which encryption algorithm is the most recommended by the PCI standard?

    Does anyone know if AKA ver 2 protocol is PCI compliance?

    Keren5 pointsBadges:
  • Link Access automated form to separate outlook mailbox

    I want to email a form from access to 5,000+ indiviudals. This form contains sensitive data so I want to encrypt an outlook mailbox (we'll call it mailbox B) for the purpose of this correspondance. The outlook mailbox is separate from my personal mailbox (mailbox A). The problem I'm having is that...

    KNK5 pointsBadges:
  • Windows Server 2008 encryption

    Can I encrypt data over the wire between local Windows Server 2008 local servers?

    NewnanIT1,110 pointsBadges:
  • Encrypting DHCP requests and traffic

    Is it possible to encrypt DHCP requests and traffic?

    Troubleshooter24755 pointsBadges:
  • Encrypting traffic and data

    Can we encrypt the traffic and data from HR's computer to the CEO and nothing else on the network? We are running Windows 7 on the desktop.

    TeachMeIT975 pointsBadges:
  • Weaknesses of Cloud Computing

    I know there is a lot of buzz around cloud computing, but the weaknesses seem to get no press. My greatest concerns are encryption and key management. What are the other downsides you've discovered?

    ITKE366,220 pointsBadges:
  • Encryption by Law? If so, what strength or type?

    Should encryption be explicitly proscribed in Data Security and Provacy legislation like the Massachusetts Data Prvacy Law and the White House cybersecurity initiative? If so, what strength or method? Should there be a minimum strength? What do you think?

    SarahCortes30 pointsBadges:
  • Lotus notes ciphered message & TDES encryption strength

    How I can confirm that cross certify Lotus messages are comply with TDES encryption strength (and the ciphertext form acceptable is encrypted using the KEK)?

    Stero15 pointsBadges:
  • Tracking the computer or source of an email

    system: Ex 2003 back-end cluster, Ex 2003 Network Load Balanced Front end. Hi there, A user's account has become comprimised. They have since changed their password, but there are a few mails sent from their account that they did not send. Is it possible to find out the source ie PC hostname or IP...

    Maclanachu0 pointsBadges:
  • Encrypting a HDD with FIPS-140-2

    Hi all, I know very little about encrypting stuff but is this easyish? Ive been a technician for a while and a customer has asked me to do it for him. Should I send to him a company that do it or can I do myself for him?

    Solsoftcomputers15 pointsBadges:
  • Encryption software for corporate laptops

    Is there free encryption software for our corporate laptops? Does it offer remote wiping capabilities?

    TeachMeIT975 pointsBadges:
  • Windows server 2003 x2 server VPN encryption

    When doing a Windows Server 2003 to Windows server 2003 vpn what type of encryption should we use being the most restrictive as possible?

    NewnanIT1,110 pointsBadges:
  • IP encryptor configuration

    LAN "A" connected to IP encryptor and connected to LAN "B" with also has an IP encryptor. i.e. we have IPsec VPN from "A" to "B" through MPLS VPN. Can I then connect LAN "A" to LAN "C" that is without IP encryptor via MPLS VPN. How do I configure the IP encryptor at LAN "A" to do that.

    IPencryptor5 pointsBadges:
  • Assigning wireless encryption

    What methods of assigning wireless encryption codes to our users do we have? I want the process to be automated where they connect to the network and see a web page where they can log in and retrieve their codes. What options do I have?

    TeachMeIT975 pointsBadges:
  • Mobile encryption / security

    I'm looking for companies developing next generation mobile security and encryption. Any suggestions?  Thank you, Matt

    Mattperrini15 pointsBadges:
  • Lotus Notes Database encryption

    Is Lotus Notes encryption linked to the computer on which it is installed? I just moved to a new computer and now there is no access to the database.

    MJK265 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following