• ID Theft and National Security

    If it turns out, as I believe, that enemies of the United States are behind a lot of the major ID thefts in the US, that would mean that a lot of money is going to our enemies. Can we therefore surmise that those who mishandle our identity information, by means of their poor stewardship of our...

    InfoSafety75 pointsBadges:
  • Network Connection Freezes

    For some reason, at random, among 20 PCs on my network, in the morning or during the day, the network connection stops responding for both intranet and internet communications. The only solution thus far is to remove the NIC from the Device Manager, reboot the PC, and let Windows XP Pro find the...

    DboiSOBE0 pointsBadges:
  • Best practices involving admin rights for user on user system

    We are currently in the middle of figuring out the approach we are going to take in regard to a user having admin rights on their system. Typcially we set up a new user as an administrator on their system when they are logged into the domain. They don't have a local admin account on the system,...

    Kevins740 pointsBadges:
  • Encryption of internet password in Domino

    In notes directory, I am changing the internet password of a Person, when i enter password, it gets encrypted first, using @password function and the password is displayed in a encrypted format like this (63E4BD1FEFD8913B15A5A5EF484A3F6B06). But when i try to save the document, it again get...

    srihoneysh15 pointsBadges:
  • Tape drive showing Interface error

    Hi. . . I have this tape drive attached to an EKM server for encryption is showing this error everytime I do a DUPTAP Message . . . . : Condition of source/sink object TAP05 not valid. Cause . . . . . : The condition of the source/sink object is not valid. The affected operation value is X'4001'...

    Jerico125 pointsBadges:
  • accessing a password-protected hd

    Hello everyone. My brother sent me his hard drive becuase his motherboard crapped out and he needs the data from his hard drive. I plugged it into my computer through an IDE connection and i can see most of the files on the computer. However, the data he needs resides within his "documents and...

    Whobettrthankyle0 pointsBadges:
  • internal LTO4 tape drive

    can an internal LTO4 tape drive support encryption on i 8203 power6 server?

    Campanaj5 pointsBadges:
  • Encryption: An “unapproachable” subject?

    In a recent SearchMidmarketSecurity.com article, contributor Mike Chapple says, "Unfortunately, many security practitioners don't fully understand encryption due to the technology's ill-deserved reputation as the unapproachable domain of mathematicians and cryptographers." Do you agree? And what...

    SearchMidmarketSecurityATE150 pointsBadges:
  • Secure data transmission

    What's the best solution for a company that wants to securely receive documents from other business partners electronically. The company in question frequently receives documents containing financial information from other external entities. The company would like to ensure that the documents being...

    ShawnCie5 pointsBadges:
  • AS400 password encryption

    Hi, how can I verify the password encryption method used by the AS400/Iseries machine. Thanks. . .

    Jerico125 pointsBadges:
  • excel encryption

    I wish to encrypt and send excel spreadsheets to customers where they can modify some input data and calculate but not read formulars or change the spreadsheet. I want a form of security that is better that the standard microsoft encryption that cannot easily be broken by password crackers.

    Mosswood5 pointsBadges:
  • Encrypting passwords on SQL server 2000

    I m using SQL server 2000 and I want to use a password field for Employee Master. My question is how to encrypt this password field in my insert query. I have heard about the “EncryptByPassPhrase” function and symmetric key, but it is provided from SQL Server 2005. I have tried using pwdencrypt...

    SQL Server Ask the Experts2,585 pointsBadges:
  • RSA 1024 for Delphi and .NET

    Hi All, I need to do public key encryption with certificates so that I can encrypt something in Delphi and pass it to a dot net app and have it decrypt. It needs to be RSA 1024. I have been able to do this in Delphi but not sure how to decrypt it in dot net. Does anyone having experience in doing...

    Virtualnil15 pointsBadges:
  • Which Linux client is best for full encryption on a limited platform?

    Okay, I realize "full encryption" might be interpreted in different ways – and my intention is not to start a Linux flame war – but I was hoping to hear some opinions on which Linux clients perform best on limited platforms with full-time data encryption. Two questions: 1) If 256-bit encryption...

    BrentSheets6,925 pointsBadges:
  • iSeries backup encryption on LT04?

    Hi, We are looking to encrypt our backups and having looked about it appears that using a fibre attached LT04 in the tape library where the encryption is done at hardware level would be the best /cheapest option. It is the best option for us as it also says that no software is required, however...

    Col7775 pointsBadges:
  • Golden Gate

    Where can I find detailed information on Golden Gate software?

    Cgardel30 pointsBadges:
  • moving program code between lpars.

    I was wondering as to the best way to enable my operations staff to move program code from a test lpar to the production lpar. Because of audit requirements I can't have the programers able to move the code themselves.

    Mstallings0 pointsBadges:
  • Storing encrypted files on an SQL Server 2000

    We are doing our final year project as a secured electronic voting system. To finish this project, we are in need of storing our votes in an encrypted form to provide security and, to do so, we are using back-end as SQL Server 2000. Is this possible or must we change our back-end?

    SQL Server Ask the Experts2,585 pointsBadges:
  • User Auditing/Journaling

    I'm new to security on the AS/400 (730). We need to have a record of what program a user calls through our ERP system or what objects are changed and who changed them. I've read some on journaling but not sure if that will work for what we need. Suggestions? Thanks Mark

    Hllwyrs0 pointsBadges:
  • Looking for application vulnerability scanner

    My group is considering implementing an application vulnerability scanner to look for security holes in our Web sites. Can you recommend some products? Thanks

    Coder6270 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following