• Add password to VNC

    This is more of a general understanding instead of a question - A friend of mine told me that VNC is not encrypted. Should I setup a password for it? I've read that it's not worth it. Is it really secure?

    ITKE1,051,735 pointsBadges:
  • Digiboard, Inc on my home network and I didn’t put it on there

    I did a security scan on my home network and found out this digiboard, inc was listed on my network. I have no idea why it is on there, who put it there, and I want it off my network.

    Firecraker5 pointsBadges:
  • Antivirus works on which layer of network

    For my antivirus, which layer of me network will it work on?

    Nikskor5 pointsBadges:
  • Is it possible to bypass an Internet blackout?

    Please, I would like to know if there is any possibility off bypassing an Internet blackout?

    mbindealen50 pointsBadges:
  • Can I trace all activity on cell phones and laptops if they are using my Wi-Fi?

    Would I be able to trace all activity on cell phones and laptops if they are using my Wi-Fi?

    Dsb20175 pointsBadges:
  • Netgear DG834 fails to block sites using HTTPS

    Using a netgear dg834 we have set a block for www.facebook.com this works fine if the users attempts to contact through HTTP but if they do an HTTPS access then this bypass's the filter and allows them access. Any help would be greatly appreciated.

    CITS15 pointsBadges:
  • Remote access security reference architecture

    Hi experts I am looking for a high level remote access security reference architecture and best practices. Following NIST document looks like a good start. Can anyone please give any further recommendations? Thanks in Advance.

    wonder00725 pointsBadges:
  • Network with virtual request

    How I can relate to network with virtual request?

    datauser5 pointsBadges:
  • What is Port 443? Why do SSL VPNs make use of it?

    I am setting up a Web SSL VPN for remote access across my WAN. Can someone explain why SSL VPNs use Port 443? Can I use any other port?

    SearchEnterpriseWAN1,580 pointsBadges:
  • Port security for Switches

    Switch(config)#interface fastEthernet 0/1 Switch(config-if)#switchport port-security Command rejected: FastEthernet0/1 is a dynamic port. Why is that happening?

    Shiko15 pointsBadges:
  • Setup multiple passwords on Wi-Fi network

    We have 4 children in our family (most of them teenagers) and I would like to setup multiple passwords for each child on our Wi-Fi network. Can that be done? Any help is greatly appreciated.

    ITKE1,051,735 pointsBadges:
  • How to know if someone can see my web history

    This is more of a general IT/technology question. I'm on a password protected Wi-Fi network and I just did a scan for viruses (nothing came up). I'm still worried someone can see my web history. Is that possible? If so, what else can I do to make it more secure?

    ITKE1,051,735 pointsBadges:
  • L2 versus L3 on your WAN

    We are running Comcast Fiber between sites.  I was wondering what the best practice is for using Layer 2 or Layer 3 across the link.  We current use both.  Are there security reasons for doing one versus the other?  Also interested in hearing general thoughts on it.

    ITKE1,051,735 pointsBadges:
  • Troubleshoot asymmetric routing in TCP based connection

    How can I troubleshoot asymmetric routing in TCP based connection?

    yfaizan15 pointsBadges:
  • Best Firewall UTM for 2017

    What is the best firewall UTM for 2017?

    mahboabalighaleb30 pointsBadges:
  • How to find laptop network security code

    My daughter gave me her laptop. I have a wireless computer in my home. Her laptops asks for my network security code. How can I use her laptop as my own. Where do I find this code? It keeps saying no Internet connection.

    BLONDE5 pointsBadges:
  • How to stop IP address from being hacked?

    I noticed that my IP address was hacked. My Internet connection has become very slow and it looks like he has access to my data. How can I stop this? Even a temporarily solution would help right now.

    ITKE1,051,735 pointsBadges:
  • External IT company auditing security and policies

    We have an external IT company auditing our security and policies. What kind of access should we give them? Should we be worried about auditing the auditors?

    Troubleshooter24755 pointsBadges:
  • Accidentally open a reverse TCP meterpreter connection

    Can I get in trouble for accidentally opening a reverse TCP meterpreter connection to a malware scanning website? I was testing out if my meterpreter exe file was detectable with some online sandbox analyser when I got a meterpreter session in armitage. I used clearev because I read that will erase...

    Kokolol995 pointsBadges:
  • How to secure my network if UDP port is required to be allowed from outside

    Hi Team, We have a business requirement in which we need to open up Video session for our customers to contact our Customer Service Agents. Product requires UDP ports to be opened on Firewall. Kindly advise how can we secure this setup.

    GBPEC105 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

Thanks! We'll email you when relevant content is added and updated.

Following