• Mobile spyware

    Good afternoon, I would like to ask if the mobile softwares that filter the sms and calls on white lists & black lists are a spyware that could attack my privacy. Softwares like Mcleaner & Black & White Guard 1.06 from CMI Technologies in Czech? Also is Kaspersky Mobile Security 9 a good guard to...

    Bisso675 pointsBadges:
  • Oracle9i an Biometric system

    What is the advantages of using Oracle9i for Biometric transactions( that is, when using biometrics technology for financial transactions)?

    Praiserehoboth110 pointsBadges:
  • Forcing HTTP/HTTPS Traffic Thru a Specific Connection

    Hello I have several sites connected via a MPLS network for MS Exchange and other shared resources. Currently we have an Internet connection going into one site and making HTTP/HTTPS traffic accessable to the other sites over the MPLS network. We would like to use a secondary Internet connection...

    Gongos5 pointsBadges:
  • Locked out of Cisco Router – Password reset doesn’t work

    do work for a local non-profit group. Apparently some prior network admin left under unhappy circumstances and did something to the cisco router(s) there. We had no password access, so I went through the password recovery/reset procedure. Everything seemed to be fine except for two little details:...

    Bobkberg1,070 pointsBadges:
  • How to determine password expiration

    Recently this iSeries user wrote in with a question about password expiration. He writes, "How can I tell if a user's password does not expire? I've used the user profile report, but all it gives me for expiration values are 0's or -1's for all of the users." Can you help? Michelle Davidson Editor...

    MichelleDavidson435 pointsBadges:
  • journal entry’s entry specific data

    Hi, I am trying to extract fields from security audit events. The problem comes when dealing with entry specific data field. This field contains lot of info which varies according to the entry type. Is there any API which returns information present in the entry specific data portion in a...

    Pprasad1230 pointsBadges:
  • Deploying VOIP and QOS

    We want to deploy VOIP to our network. We first need to implement QOS how can we do that? We have all HP switches and Cisco routers. The firewall is also a Cisco (PIX).

    Karl Gechlik9,860 pointsBadges:
  • what is needed to beacome a ethical hacker

    Hi guys i am interested in ethical hacking i just dont know where to start learning. What is needed to do the job i have been told to learn PHP and python but i need a much more concrete answer or suggestion can anyone point me in the right direction i am willing to go as far as needed i am not a...

    Scribble165 pointsBadges:
  • AVG Free 2011 popup windows throughout the day

    I recently upgraded AVG Free 9 &10 to AVG Free 2011. THe first two installs failed and the third one worked. However, throughout the day, I notice a popup screen asking permission to access my internet connection. The message says "hbf.cloud.avg.com" is wanting to access my internet connection....

    Questioner295 pointsBadges:
  • Tidserv request 2 attack: Virus or malware?

    Norton is giving me a message saying a tidserv request2 was block, is this a virus or malware infection?

    Reggies90 pointsBadges:
  • College For Information Security and Risk Management

    Hi im about to begin my goal in computer information secuirty and risk management....im just curious as to 1) the types of jobs this bachelors would allow me to get 2) what is a starting salary? and 3) what else would you reccomend that i take in the IT Field (school wise) to further excell this...

    O1910 pointsBadges:
  • Track confidential data being input to Windows Domain computers

    information being entered by any domain computer? We want to track confidential information and make sure it is not getting out of the company.

    Karl Gechlik9,860 pointsBadges:
  • Moving FTP to FTPS on iSeries

    A search400 reader wrote in this question: We are in the process of moving from ftp to ftps on our iSeries v5r3. We have an automated cl that does our ftp. I am just trying to find out if moving to ftps will require modification to our current CL. i.e any new parameters that need to be included or...

    Leah Rosin575 pointsBadges:
  • Windows firewall settings via group policy

    Can we push out windows firewall settings via group policy and then lock out the user from modifying or changing the rules in any way? Can administrators get around this?

    NewnanIT1,110 pointsBadges:
  • Scanning Windows XP workstations for known vulnerabilities

    Can we scan Windows XP workstations for known vulnerabilities in the OS or installed applications?

    TeachMeIT975 pointsBadges:
  • Network Management

    As Enterprice network grow larger, management becomes difficult and certain tools and standards are neccesary for good network performance . I need an expert solution for network management in an Enterprise going through a similar scenario .I need help on what and how a system can be established to...

    Ngoube0 pointsBadges:
  • Lotus Notes email security issue regarding forwarding email to gmail account

    Is it possible for to set your lotus notes account to send emails to an outside mailbox automatically (gmail etc)? I recevied a strange message yesterday something to the effect "your forwarded message to your gmail account failed". I don't have a gmail account and am concerned I might have a...

    Um1988885 pointsBadges:
  • Computer access problem on network

    hello, I am facing this problem from many days.the problem is ,when I share some folder on my computer (even with everyone rights) it is not accessible to other computer and display error message "Access denied". I turned off my firewall,create user and assign appropriate rights to user on...

    Thbaig15 pointsBadges:
  • Career Query

    I  have done BSc Computer Science from Mumbai University. What shall i do further which will be beneficial for my future. m thinking of doing MSc I.T.   &  den RedHat certification which  are the RedHat certifications that will prove beneficial for future ?   Mostly m intersted in Network...

    Senvidya5 pointsBadges:
  • Test early without test design/cases. Is this correct in test cycle?

    Hi, I would like to know if anyone has this issue and how to solve it. My test project estimation for each module has been given by Project manager. Each of the testing stage for example test design, test execution, test reporting and retest defects in within a dedicated time. However, most of the...

    maylee5 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following