I am working on a Project for making an antivirus.I have 2 other project parteners. But we don’t have an guidance on how to develop the antivirus.Plz give me any relevent Information on this subject.(like components of AV,Algorithms(efficient),methods,general detection & removal of virus).(Also tell me )where can i find this information ?
Answer Question | June 29, 2012 3:49 AM
Application security, Architecture/Design, Central Command, Compliance, Computer Associates, CRM, Database, DataCenter, Desktop antivirus, Development, Disaster Recovery, Documentation, Encryption, Exchange, F-Secure, Features/Functionality, Fortinet, Help Desk, Information risk management, Instant Messaging, Intrusion management, Lifecycle development, Panda, Policies, Product evaluation, Redundancy, Risk management, Secure Coding, Security, Security management, Security products, Security Program Management, Service and support, Signature updating/Management, Software Quality Assurance, Storage, Tech support, Third-party services, Trend Micro, Vendor support, Vendors, VPN, Vulnerability Assessment & Audit
I was wondering as to the best way to enable my operations staff to move program code from a test lpar to the production lpar. Because of audit requirements I can’t have the programers able to move the code themselves.
Answer Question | March 12, 2010 9:14 AM
Application security, Auditing, Database, DataCenter, Encryption, Exchange, Information risk management, Instant Messaging, Secure Coding
We are an I-series shop running V5R2 and have been tasked with encrypting one file on that platform. We do not share this data with other servers. It always remains on the I-series. We currently protect it by revoking all authortity except for one user. Upper management wants encryption. We have the license program 5722AC3-Crypto [...]
Answer Question | February 11, 2005 12:08 PM
Application security, Database, Encryption, Exchange, Instant Messaging, Secure Coding
I have a small WORKGROUP with windows 2000 server and 5 windows XP professional systems. All computers can read/write each other. Now I want to make one XP client secure/restric access, so that no other computer can access that except only other XP computer. How can I do that? Please advise. Thanks in advance!
Answer Question | December 29, 2004 2:48 AM
Administration, Application security, Compliance, CRM, Database, DataCenter, Desktop management applications, DHCP, Disaster Recovery, DNS, Encryption, Exchange, Firewalls, Forensics, Help Desk, Implementation, Incident response, Information risk management, Instant Messaging, Intrusion management, Management, Network monitoring, Network security, Networking, Networking services, Physical security, Policies, Remote management, Remote users, Risk management, Secure Coding, Security, Security management, Security Program Management, Servers, System utilities, Tech support, Third-party services, VPN, Windows, Windows 2000 Server, Wireless
i’m try to create a vpn from the internet to my “small buisness server 2003″ that act as vpn server without any luck, if i try to connect to my server from the internal network it’s work just fine, iv’e mapped the correct ports according to the microsoft article that say to forward port 1723 [...]
Answer Question | June 29, 2012 6:01 PM
Administration, Application security, Architecture/Design, Database, Documentation, Encryption, Exchange, Features/Functionality, Firewalls, Forensics, Help Desk, Implementation, Incident response, Installation, Instant Messaging, Intrusion management, IT architecture, Knowledge management applications, Network security, Planning, Secure Coding, Security, Security management, Security products, Service and support, Spam, VPN, Wireless
This is mu stored Procedure: CREATE PROCEDURE ADMINISTRATOR.DIMS_SP_PerformSearch ( vuserId integer, vsearchText varchar(500) , vfromID integer, voption integer ) ———————————————————————— – SQL Stored Procedure ———————————————————————— BEGIN IF (vsearchText != ”) THEN delete from DIMS_General_Search where userId = vuserId; end if; IF (voption = 0) THEN INSERT INTO DIMS_General_Search SELECT vuserId,DIMS_Scanned_Transaction.scanned_date , DIMS_Document_Type.document_type_name , DIMS_Document_type_Attributes.attribute_name,DIMS_Scanned_transaction_Detail.answer, DIMS_Scanned_Transaction.scanned_transaction_id [...]
Answer Question | December 17, 2004 2:20 AM
Application software, Availability, DB2 Everyplace, Development, IBM, Instant Messaging, Java, Migration, Modeling, Normalization, Performance/Tuning, Servers, WebSphere Studio
Hello!! Recently all of my users after loging to Lotus Notes are asked for logging to IM (which is not used in our organization). I know that I can switch it off in a location document, but it’s really time consuming … I’ve checked policy/settings documents (no path to a Sametime server) and server document [...]
Answer Question | December 14, 2004 6:45 AM
Instant Messaging, Lotus Domino
Hello, I need to find an Enterprise IM solution that will handle message logging and archiving on the server side, not the client. I’ve looked at LCS from Microsoft but don’t have the budget to upgrade to Exchange 2003 so its a no go. What are some of my other options? BTW the is a [...]
Answer Question | November 5, 2004 3:29 PM
Exchange, Instant Messaging, IT architecture
Hi! Please, I would like to know if it is possible to use the Internet Connection Sharing feature on a Windows 2000 server system set up as a domain controller. If yes, is anything compromised or affected in anyway? Many thnks!
Answer Question | November 14, 2010 5:28 AM
Bandwidth, DataCenter, DHCP, DNS, Instant Messaging, Microsoft Windows, Networking services, Sendmail
Hi, all I’m trying to set up Oracle Internet Directory Rel 9. I’m trying to use APIs provided in Application Developer’s Guide. I started by copying and trying to run the examples given in the guide. My procedure connects to LDAP, authenticates me, but won’t create a user. (Actually, it passes the create_user_heandle procedure, but [...]
Answer Question | November 10, 2010 1:31 PM
Application security, Biometrics, Database, Development, Digital certificates, Encryption, Exchange, Identity & Access Management, Instant Messaging, Oracle, provisioning, Secure Coding, Security, Security tokens, Single sign-on, SQL
We are considering lowering the lockwait time from the two minute default to 60 seconds and then possibly even lower. What do you have it set to today? Have you had any experience with having it set well below one minute?
Answer Question | May 14, 2004 1:33 PM
IBM, Instant Messaging, OS/390, OS/390/z/OS, UDB for mainframe, z/OS