• traditional linux file schema

    what are the benefits of the traditional Linux file schema and how might it be superior to permission methodologies employed in other operating systems

    kirt24655 pointsBadges:
  • Free IT Book: AAA Identity Management Security

    This week's free IT book is your complete, authoritative guide to implementing, configuring, and managing AAA with CiscoSecure ACS. For a chance to win AAA Identity Management Security, answer one of the questions listed below and post the link to your answer in the discussion section of this...

    MelanieYarbrough6,345 pointsBadges:
  • Free IT Book: CompTIA Security+ Certification Passport

    This week's free IT book is Mike Meyers' CompTIA Security+ Certification Passport: Revised for the new CompTIA Security+ exam (SY0-301). The new edition provides a condensed and concise review of CompTIA’s well-established security credential. For a chance to win this quick review, cram-style...

    MelanieYarbrough6,345 pointsBadges:
  • Free IT Book: The Accidental Administrator: Cisco ASA Security Appliance

    This week's free IT book comes with a bonus interview with the author, Don Crawley! Check out what he has to say about the book, the process, and the joys of being an IT-type personality. Then answer one of the questions below and post the link to your answer in the discussion section for your...

    MelanieYarbrough6,345 pointsBadges:
  • Wanted to configure PGP on Oracle applications R12

    Hi, We are currently on Oracle Applications R12 based on Unix Platform.  We have a requirement to encrypt the files using the PGP key and FTP to another server. The other server will require to decrypt these files. Can you please let me know from where I have to start? Do we need any...

    khushbub5 pointsBadges:
  • Linux database security

    What are the database security requirements in a Linux environment?

    Cnotejunebug20 pointsBadges:
  • UNIX Security Assessment

    What is the best way UNIX Assessment procedure?

    Dharmagrao100 pointsBadges:
  • Security implications surrouding outbound SSH traffic

    The school that my son goes to blocks outbound SSH traffic. The users inside the network can't use Port 22 / trying to make a SSH connection through another port is also blocked. The reason I was given for this was because it's putting the users inside the network at risk and would allow port...

    ITKE342,450 pointsBadges:
  • Cross-platform tools for security, monitoring

    What would be some good cross-platform administration tools to use for an environment running Windows OS X and Debian's test release lenny? It is a small business (<200 employees) and the main concerns are being able to perform secure file transfers throughout the system and keeping track of...

    Linux - Ask the Expert270 pointsBadges:
  • Interpreting bandwidth usage by MRTG/CACTI

    Hello guys. We have a dedicated lease line of 1 E1 (2Mbps) that we subscribe from an ISP. For the past several months, we have noticed that internet connection is so slow and it keeps us thinking if we are getting what we are paying for. I need help in interpreting an MRTG graph from CACTI of our...

    JuneC155 pointsBadges:
  • How does Unbuntu encrypt its disk utility?

    Is Ubuntu's disk utility encryption very secure? If so, what kind of algorithm runs it? Does anyone have documentation about it or know where I can find it?

    ITKE342,450 pointsBadges:
  • Is Port Knocking a good idea?

    I generally lock down SSH and other non-public services so that they can only be accessed by specific IP addresses. But some businesses we work with do not have static IPs and occasionally they need to provide access for contractors and outside developers. I have been told that Port Knocking could...

    ITKE342,450 pointsBadges:
  • Thoughts on a multiboot system with encryption and pre-boot authentication

    I'm running a system that runs Windows 7 and Windows XP, with Red Hat soon to be added. All this in conjunction with Grub 2 boot loader. How would I go about setting up a multiboot system with hard drive encryption and pre-boot authentication?I know TrueCrypt could be used to pre-boot...

    ITKE342,450 pointsBadges:
  • Move from software testing to a presales engineer role

    Does anyone know the best way to move from software testing to a presales engineer role?

    mjp20085 pointsBadges:
  • Scanning Linux server for Viruses

    I need to scan uploaded files for viruses on a Linux server, but I'm not sure how to go about it. Any suggestions?

    ITKE342,450 pointsBadges:
  • Storing and retrieving data

    I have something very specific I want my spreadsheet to do for a schedule I am making. I want to be able to add data as text (IE shower or eat out) as a list 1-40. Ths list would give each text a value 1-5. If the text is already in the database, then it would only add the value to the balance...

    shyfellow19555 pointsBadges:
  • RSA and DSA keys: Which one should I choose?

    I've been generating SSH Authentication keys on a Linux/Unix using ssh-keygen. After doing that, I've been given the choice of either creating a RSA or DSA key pair (using -t type).This has me curious: What are the big differences between RSA and DSA keys? Why should I choose one over the other?

    ITKE342,450 pointsBadges:
  • Connecting to SSH via Ubuntu?

    We have an Ubuntu VM running on a Windows 7 machine. What do I need to to get it so that I can access the webserver externally through SSH? I found steps (in Setup SSH access between VirtualBox Host and Guest VMs) so that SSH can be accessed by guests from my host, but how do I access it through my...

    ITKE342,450 pointsBadges:
  • Linux Virtualization with VMWare or Virtual Box

    I have found, in multiple locations, that there is a way to force 3d acceleration into a virtual machine allowing Gnome3 (and even Unity in certain scenarios) to run. I have not been able to make this work at all. I selected the "3D Acceleration" box in both programs but neither will recognize the...

    LinuxCiscoman820 pointsBadges:
  • Regarding SFTP

    I am not a AS/400 programmer but overheard my colleagues and suggested them to use SSH. Greatly appreciated if anyone can suggest here... They have a batch job which creates a text file containing the sftp command passing IP address, username, password and the file to be transferred. I suggested...

    bijunator5 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following