• Security Implementation

    With the recent spate of news stories about the apparent information assurance/security failures that have come to light as a result of the events that transpired between Aaron Bar and Anonymous, I’ve been discussing security program implementation with my classmates at the Universtity of...

    Packetsneaker20 pointsBadges:
  • User circumventing security

    We have a rogue user who knows more than she should. She can grant herself and other users the authority to access files that are supposed to be secured. Does anyone know of how we can monitor her activity or go back and review what she has done or anything that we can do. We think she may be using...

    Mouse3330 pointsBadges:
  • ChoicePoint CISO says breach not an information security issue

    The CISO of ChoicePoint says the theft of private information on 145,000 from its databases isn't an information security issue because conmen used fraud, not hacking tools or techniques, to get the information. Anyone agree with that? Check it out:...

    Athletica0 pointsBadges:
  • Cross-platform tools for security, monitoring

    What would be some good cross-platform administration tools to use for an environment running Windows OS X and Debian's test release lenny? It is a small business (<200 employees) and the main concerns are being able to perform secure file transfers throughout the system and keeping track of...

    Linux - Ask the Expert270 pointsBadges:
  • How to generate a listing of security information of Win 2003 server folders

    Does somebody know if there is a way to query the Directory database to obtain a listing that includes security and other settings (shares, permissions, etc) of all folders and subfolders of a machine running Win 2003 Server ? Any help or comment will be appreciated.

    carlosdl70,200 pointsBadges:
  • Network Security refresher training

    Hello, I was wondering if anyone can refer me to a good and basically free online network auditing, testing, documentation resource available online. thank you.

    Fwguyus5 pointsBadges:
  • security CheckPoint vs. PIX firewalls

    Dear can any one know which one best technology Checkpoint or PIX?

    Networkfierwall5 pointsBadges:
  • OST files

    We are migrating users from one exchange server to another. the users sit in remote sites and use very slow links to connect to the exchange server. Is it possible to use the old ost on the pc for the new exchange server instead of recreating the ost with the new exchange server, which can take...

    PaulBone10 pointsBadges:
  • THREE (3) Security Concerns

    We have a desktop with Windows XP SP2, Microsoft Office 2003, and a subscription to McAfee Total Protection 2008 that began in September 2007, among other things. We also just purchased a laptop with Windows Vista and Norton's Antivirus/Antispyware 2008 so far. We will eventually install Office...

    JandNLarson55 pointsBadges:
  • What is the best security tool out there to use to manage virtual machines?

    What is the best security tool out there to use to manage virtual machines?

    ITKE351,965 pointsBadges:
  • What is the best way to persuade a security manager to upgrade poorly outdated software/devices?

    I've mentioned security risk, not to mention how upgrading will do a world of good and provide more features to allow us to enhance our tools to make us more productive. I come from an ISP where IT was not a cost center. I may be spoiled, but we are running on Hoary, and everything is manual it...

    Mnemonyss5 pointsBadges:
  • Do network and security pros get along?

    Hello, I'm an editor for SearchNetworking.com, and I'd like to throw out a question. I know that SearchNetworking readers are very interested in network security, but there also seems to be tension between the networking team and the security team in large organizations. Does anyone have any...

    SusanFogarty0 pointsBadges:
  • Email Security SaaS

    For those of you who have outsourced email security, what were you looking for in terms of differentiators between email SaaS providers?

    SearchMidmarketSecurityATE150 pointsBadges:
  • Home Dir Security and file sync aka CSC

    I having issues configuring Home directory file sync. After I configured folder redirection by MS recommendations, I receive a folder permissions error when I right click on a file and tell it to sync. Following MS's white paper on configuring redirected folders,...

    JEAKINS0 pointsBadges:
  • Looking for a solution to our software firewall issue

    I work in a small office and we run a router with a dedicated hardware firewall behind it that filters and routes traffic before it hits the LAN. It seems a lot of our internal PC issues are caused by our current firewall, but we obviously can't just turn it off.Does it make sense for us to...

    ITKE351,965 pointsBadges:
  • Does anyone use bcrypt?

    I have some questions about bcrypt since I'm looking for an unusual way to protect my passwords.I know its like 15 years old, but its not widely adopted and I haven't heard any tales of it being cracked. So does anyone use it? Are there any NIST recommendations about it?  I couldn't find any.

    ITKE351,965 pointsBadges:
  • RSA: Doing a dictionary attack

    In my understanding of learning "Security", I'm looking to learn more about how RSA works. Here's my basic understanding of RSA:Having the public key allows you to encrypt things. Encrypting the same message "Hello" on two different computers using the same public key will produce the same...

    ITKE351,965 pointsBadges:
  • Lotus Notes security: Changing image for password

    I've recently noticed in Lotus Notes that when it asks for my password, it always shows a screen with a picture that appears to change after a new character is entered (after the fifth character).Now I'm not sure if this is security related but is this a way to distract an attacker from looking at...

    ITKE351,965 pointsBadges:
  • Is it worth it to password protect a servers BIOS?

    I have set up password protection on the BIOS of my server, which kicks in when the you enter BIOS setup. My worry is that someone could enter setup and apply a master boot password thereby taking control of the system. Is this a realistic fear and does a password actually help in securing the data...

    ITKE351,965 pointsBadges:
  • What are some of the best practices in handling computer viruses?

    I know this might sound like a broad question but I'm looking to start a good discussion here. For many SMBs, acquiring malware sometimes feels like an inevitability (despite putting in different security patches/antivirus software/etc.). I'm not looking to talk about the prevention of viruses but...

    ITKE351,965 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following