• What is the best way to persuade a security manager to upgrade poorly outdated software/devices?

    I've mentioned security risk, not to mention how upgrading will do a world of good and provide more features to allow us to enhance our tools to make us more productive. I come from an ISP where IT was not a cost center. I may be spoiled, but we are running on Hoary, and everything is manual it...

    Mnemonyss5 pointsBadges:
  • Do network and security pros get along?

    Hello, I'm an editor for SearchNetworking.com, and I'd like to throw out a question. I know that SearchNetworking readers are very interested in network security, but there also seems to be tension between the networking team and the security team in large organizations. Does anyone have any...

    SusanFogarty0 pointsBadges:
  • Email Security SaaS

    For those of you who have outsourced email security, what were you looking for in terms of differentiators between email SaaS providers?

    SearchMidmarketSecurityATE150 pointsBadges:
  • Home Dir Security and file sync aka CSC

    I having issues configuring Home directory file sync. After I configured folder redirection by MS recommendations, I receive a folder permissions error when I right click on a file and tell it to sync. Following MS's white paper on configuring redirected folders,...

    JEAKINS0 pointsBadges:
  • Looking for a solution to our software firewall issue

    I work in a small office and we run a router with a dedicated hardware firewall behind it that filters and routes traffic before it hits the LAN. It seems a lot of our internal PC issues are caused by our current firewall, but we obviously can't just turn it off.Does it make sense for us to...

    ITKE352,420 pointsBadges:
  • Does anyone use bcrypt?

    I have some questions about bcrypt since I'm looking for an unusual way to protect my passwords.I know its like 15 years old, but its not widely adopted and I haven't heard any tales of it being cracked. So does anyone use it? Are there any NIST recommendations about it?  I couldn't find any.

    ITKE352,420 pointsBadges:
  • RSA: Doing a dictionary attack

    In my understanding of learning "Security", I'm looking to learn more about how RSA works. Here's my basic understanding of RSA:Having the public key allows you to encrypt things. Encrypting the same message "Hello" on two different computers using the same public key will produce the same...

    ITKE352,420 pointsBadges:
  • Lotus Notes security: Changing image for password

    I've recently noticed in Lotus Notes that when it asks for my password, it always shows a screen with a picture that appears to change after a new character is entered (after the fifth character).Now I'm not sure if this is security related but is this a way to distract an attacker from looking at...

    ITKE352,420 pointsBadges:
  • Is it worth it to password protect a servers BIOS?

    I have set up password protection on the BIOS of my server, which kicks in when the you enter BIOS setup. My worry is that someone could enter setup and apply a master boot password thereby taking control of the system. Is this a realistic fear and does a password actually help in securing the data...

    ITKE352,420 pointsBadges:
  • What are some of the best practices in handling computer viruses?

    I know this might sound like a broad question but I'm looking to start a good discussion here. For many SMBs, acquiring malware sometimes feels like an inevitability (despite putting in different security patches/antivirus software/etc.). I'm not looking to talk about the prevention of viruses but...

    ITKE352,420 pointsBadges:
  • Which is more secure: Forgotten password or reset link?

    I've been recently been doing some studying on different security topics and I came across this: Is it more secure to send out a password reset link when a user forgets their password or send the original password unencrypted in an email? Now obviously I know not encrypting a password is bad...

    ITKE352,420 pointsBadges:
  • How to protect webserver hacked?

    I have some questions to protect web-server as below: Can you please tell me where is the leak of my security? Why my server is hacked, can you please tell me the possible reasons? How can I protect my server from hacker?

    seoboostertips15 pointsBadges:
  • Security implications of a password blacklist

    Does maintaining a password blacklist on database create any security risks?  Basically, I'm looking to create a list of 500 or so commonly used passwords to stump very basic automated spambots.

    ITKE352,420 pointsBadges:
  • I might be creating a virus accidentally. What should I do?

    This has been happening to me a lot lately...I'm writing an application in Delphi and after I compile it, my antivirus scanner is telling me that I'm actually creating a virus and it immediately deletes the executable again. It's easy to fix (by doing a full rebuild) or simply waiting but it's...

    ITKE352,420 pointsBadges:
  • Internet access restriction via GPO

    I need to restrict internet access in a particular department in my organsation and i need a way by i cld do that using Group Policy

    Wachen60 pointsBadges:
  • I’m getting several suspicious connection attempts. What should I do?

    I'm currently running Mac OS X and I currently have a system firewall and stealth mode enabled. When I opened up my system console, I discovered a ton of blocked connection attempts from different places that I'm not familiar with. I've actually checked the locations are some are located in China...

    ITKE352,420 pointsBadges:
  • Dead drop email strategy: Is it actually secure?

    I'm read in the news lately (online and print) that people are starting to conceal their email traffic. So instead of sending emails to a person's inbox, they're writing messages but leaving them in a draft folder or dropbox. Then the other person would log onto the same account and look at the...

    ITKE352,420 pointsBadges:
  • How secure is Identity-Based encryption?

    Over the past several years, I was always taught to never create my own crypto algorithm. But now I'm looking into Voltage SecureMail (which does use identity-based encryption) and I think I'm way over my head in trying to figure out the quality of the system.If you've used Voltage before, I'm...

    ITKE352,420 pointsBadges:
  • Configuration of NAC Appliances

    I will like someone to help me with configuration example of these three cisco devices in a university campus network; cisco NAC 3355 NAC Manager, Cisco NAC 3315 series NAC Server and Guess Server. We just bought the equipment and I was saddle with the responsibility to make it work for the...

    ralph12360 pointsBadges:
  • Why do websites force us to use passwords of a specific length?

    What is the reason that websites have very specific directives about the type of password and it's length that you can enter (8 characters with 2 being numbers, etc.). Are there technical reasons why its this way other than to stop stupid people from entering passwords that are easy to crack?

    ITKE352,420 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following