• E-mail hacking

    How can I hack my own e-mail address? Is there software available for this (commercial or freeware)?

    Brainstorm225 pointsBadges:
  • eJabber IM Service

    I installed eJabber and am using it with PSI clients. The clients can keep a history of their chats. Is there a way to have the eJabber Server log the IM chats? I did not see it in the system information.

    Hsmithdp125 pointsBadges:
  • Instant Messaging in Windows Server 2003

    I want step wise configuration of instance messaging for internal users

  • Instant Messaging over LAN with Server 2003

    I want to setup in internal Instant messaging system on a LAN using windows 2003 server? Is this possible?

    Alexsb20005 pointsBadges:
  • Instant messenger requirement for my company

    I want to develop instant messenger for my company which work on intranet, everyone in company use it for chatting, file sharing, task creation work. Let me know what basic things I required for it, like what server-client architecture. I need to use when clients are mobile devices works on Android...

    rameshkumar00710 pointsBadges:
  • Receiving blank instant messages from coworkers

    I am receiving IMs from coworkers but there is no text in the message. I can see their responses pop up but they are blank.

    tpresland5 pointsBadges:
  • Is Trillian still being supported?

    Is Trillian still being supported or developed? The last time I used it, it got too buggy to even open. Plus, Trillian's own support page is saying that it's just been quiet on their end. Is it safe to assume I won't be able to use it again?

    Tessa Parmenter1,075 pointsBadges:
  • How to Block Chat in the Network

    Dear All, I am wrting this mail to you all, to know if any you have been successfull in Blocking Chats on your networks, and if so, then how have you acheived it? Could you please tell me which Ports to Block for MSN, Yahoo, Rediff, ICQ, Skype. I am using a NetAPPs Net Cache C 1300, and I am trying...

    Komlink0 pointsBadges:
  • Security/ Audit Check list for DB2

    Hi, I'm in the process of hardening the DB2 in Linux and I'm looking for a checklist to help me make sure I don't miss anypoint. Since I'm not an expert on DB2 I would like to have a starting point. I'm looking to make sure I don't leave open doors and also I want ot make sure I don't get an Audit...

    Josec990 pointsBadges:
  • Data vs. perimeter vs. network security

    A short time ago, author Wes Noonan wrote some tips for SearchWindowsSecurity.com about deperimeterization. He explained how security is always pitted against business needs, and perimeters have become porous because businesses require traffic from SMTP, HTTP or VPNs to pass through the firewall....

    RobynLorusso230 pointsBadges:
  • User circumventing security

    We have a rogue user who knows more than she should. She can grant herself and other users the authority to access files that are supposed to be secured. Does anyone know of how we can monitor her activity or go back and review what she has done or anything that we can do. We think she may be using...

    Mouse3330 pointsBadges:
  • Unknown Threats

    Apart from honeypots, what are the different methods to find unknown threats which are prevalent? How do I find methods to mitigate them. PS: all the vulnerabilities are known to all the n/w administrators and then can take measures to mitigate attacks but this doesn't happen..Hackers are at least...

    Czarleo0 pointsBadges:
  • Internet Fraud, Schemes, Hackers and the like

    Often times many consumers get these e-mails from Nigeria, Russia, China and so on purporting a long drawn out story about a deceased king and so on. They can be caught by looking at their headers, but I've been told sometimes they use fake e-mail addresses. Is their a fool proof way to identify...

    Intelops570 pointsBadges:
  • Configuring Lotus Sametime 7.5.1

    Is there a way to configure Lotus Sametime to show what you chat partner is typing before he sends the text? Or, a plugin that allows this option.

    JLiddle5 pointsBadges:
  • IM list

    Removal from IM list?Fri, 21 Dec 2012 00:50:20 You have been automatically removed from the IM list (im) as a result of repeated delivery error reports from your mail system. This decision was based on the list's automatic error monitoring policy and has not been reviewed or otherwise confirmed by...

    REMOVALFROMIMLIST35 pointsBadges:
  • vpn through s-box firewall of checkpoint

    i'm try to create a vpn from the internet to my "small buisness server 2003" that act as vpn server without any luck, if i try to connect to my server from the internal network it's work just fine, iv'e mapped the correct ports according to the microsoft article that say to forward port 1723 and 47...

    Drorbenyosef5 pointsBadges:
  • Developing an antivirus (efficient):for Windows:Using VC++

    I am working on a Project for making an antivirus.I have 2 other project parteners. But we don't have an guidance on how to develop the antivirus.Plz give me any relevent Information on this subject.(like components of AV,Algorithms(efficient),methods,general detection & removal of virus).(Also...

    4238830 pointsBadges:
  • Developing an antivirus (efficient):for Windows:Using VC++-2

    I am working on a Project for making an antivirus.I have 2 other project parteners. But we don't have an guidance on how to develop the antivirus.Plz give me any relevent Information on this subject.(like components of AV,Algorithms(efficient),methods,general dection & removal of virus).(Also...

    4238830 pointsBadges:
  • Internet Explorer vs. Firefox

    Hello, I'm the Assistant Editor on SearchWindowsSecurity.com. I'm looking to start a discussion about what browser people are using and why. Also, is anyone considering switching from IE to Firefox, or are your plans to stay with IE? Here's some food for thought... As of Feb. 2005, an estimated 35...

    LMullen0 pointsBadges:
  • End-user awareness education for company newsletter

    I have been given the task of developing user awareness 1-pager fact sheets to be distributed on a monthly basis in our company newsletter and posted on our intranet. I can write these from scratch but was hoping not to have to reinvent the wheel. Help?

    CalendarGirl0 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following