• Security features of a videoconferencing system

    Can anyone explain the security features behind a video conferencing system?

    sybile125 pointsBadges:
  • Service of cybersecurity for a company

    What's the service of cybersecurity for a company?

    nazmabd5 pointsBadges:
  • With Windows Update not working (Win7), will the PC be secure using Malwarebytes & Trend Micro AV?

    I have spent about 30 hours trying every Microsoft & 3rd party remedy for loss of Windows Update about 4 months ago. Since I have the premium (paid) versions of Trend and Malwarebytes, it seems I would be safe from security breaches - is this true?

    underH2Odan25 pointsBadges:
  • Someone hacked my computer again

    A few week back I fell into a trap of, "Your computer has been hit with a Virus and we can help you. I was trying to transfer my email from MSN.com to gmail.com. By the time I got done with them $$$$ later. I had to figure it out myself and now have both e-mails, but I only want one and these...

    pauldocrutter5 pointsBadges:
  • iSeries SFTP

    How do you setup for secured FTP? Can the process be automated like normal FTP?

    Mitchb145 pointsBadges:
  • Co-Worker hacking protection

    How can I protect my desktop (especially files and mail) from co-worker hacking? I am sure someone else within the company I work for, is hacking my PC. What can I do to protect my PC, before telling IT?

    GreekStefan35 pointsBadges:
  • How do you scale B to B database and application servers on AWS?

    I am working with a company that is business to business.  The businesses that are our customers are very concerned about their data.  They want to make sure they have max security. I am wondering if it is practical to have a separate application server and separate database for each business....

    jgon915 pointsBadges:
  • Netserver expert anyone?

    I'm trying to access windows folders on a server and I get this error: 'Error exchanging security information... Error Class:1, Code: 5 = Access denied. My passwords do match and I previously accesses these folders. The problem started when I changed my password.

    yaazhisai255 pointsBadges:
  • Techologies used in biometrics

    What are technologies used to develop a biometric application? Is Java is enough or are other languages needed?

    Manjunathhoigegudde15 pointsBadges:
  • How do you know if your computer has been hacked into?

    I have a few error messages coming up on my laptop screen saying someone is trying to hack into your computer. I thought it was just a virus. Does anyone know if it was a virus or was someone really trying to hack in?

    Verynew20 pointsBadges:
  • How can I connect SDK With C#?

    Could you tell me how to connect SDK with C#?! My SDK is gruail.

    chant18130 pointsBadges:
  • Can Dongle not store any data?

    We're in a restricted office space and if the data storage devices are restricted to be carried at work, can dongle be allowed? Can a dongle not store any data?

    RuchiSabherwal5 pointsBadges:
  • Deleted users audit trails in AS/400

    Scenario 1: I have been doing some cleanup of user profiles that have not logged in more than 365 days to satisfy a SOX Compliance issue. I am doing this across all of our Health facilities (57). IT Personnel from one of the facilities is concerned that they would lose the Audit trail for these...

    DCORDERO4725 pointsBadges:
  • Connect fingerprint machine with own code

    Haw I can connect my own code with the fingerprint machine, my fingerprint machine is (andy) and I add sdk to my code in C#. Please help me.

    chant18130 pointsBadges:
  • Single Sign-on For Multiple Organizations

    I need to implement a kind of single sign-on on my portal to remove the hassle of a customer who otherwise needs to login multiple times for data order. The data products may come from different vendors online directly. Each vendor has its own data web services, which I do not want to touch. I...

    HowSSO5 pointsBadges:
  • Should I use RAID on my backup server?

    I've been setting up a new backup server (using Symantec Backup Exec so that it stores hard disks instead of tape). This is because the size of our backup is outgrowing our tape capacity. But here's my question: Should I use RAID for the backup server? Thank you

    ITKE366,325 pointsBadges:
  • Hacking into my computer

    Hi, Can someone hack your computer and then set up a website to make it look like it's coming from your IP address? My laptop has no security because I never used it for banking so I didn't get any. Thanks!

    Jewels12315 pointsBadges:
  • WebSphere application server patching

    Any useful tips while patching WebSphere application server?

    ranchi9105 pointsBadges:
  • How to test WordPress 4.2 stored XSS vulnerability

    I tried to exploit in my local server but unable to do.

    prernagarg10 pointsBadges:
  • Can someone hack into your computer from somewhere else without having the password and delete your files?

    My computer file disappeared right in front of my face without it being able to be restored when I went back to the computers history when I had the files. There is no trace of my files in the trash or computer.

    Tamika5 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following