1
  • Shouldn’t a person just RSA-encrypt the entire document?

    After doing some research on Security, I've finally figured out how to verify if an email / document was actually sent by the "sender". Here's the process I've figured out:The sender gives their public RSA key to the recipient.The sender also uses SHA1 to hash the document.Then he uses his private...

    ITKE346,125 pointsBadges:
  • RSA: Doing a dictionary attack

    In my understanding of learning "Security", I'm looking to learn more about how RSA works. Here's my basic understanding of RSA:Having the public key allows you to encrypt things. Encrypting the same message "Hello" on two different computers using the same public key will produce the same...

    ITKE346,125 pointsBadges:
  • What should the process be to remove users on leave?

    Typically when a user goes on disability, short term, or parental leave, do you disable their AD? What about their exchange? RSA? Smartphone?Also, is there usually a process to inform them that you are disabling their access?

    sfuboy5 pointsBadges:
  • RSA and DSA keys: Which one should I choose?

    I've been generating SSH Authentication keys on a Linux/Unix using ssh-keygen. After doing that, I've been given the choice of either creating a RSA or DSA key pair (using -t type).This has me curious: What are the big differences between RSA and DSA keys? Why should I choose one over the other?

    ITKE346,125 pointsBadges:
  • Cache-based side channel attacks

    Please help me find a new secure mechanism against cache based side channel attacks in the cloud. I found that ieee published a method for security against AES, RSA, BTB attacks to retrieve the secret key. It is architect based method. Can I do any modification to this work after implementing this...

    mvidya199020 pointsBadges:
  • Internet Explorer vs. Firefox

    Hello, I'm the Assistant Editor on SearchWindowsSecurity.com. I'm looking to start a discussion about what browser people are using and why. Also, is anyone considering switching from IE to Firefox, or are your plans to stay with IE? Here's some food for thought... As of Feb. 2005, an estimated 35...

    LMullen0 pointsBadges:
  • Open IT Forum: What IT conferences are you attending this year?

    Below is a list of the conferences IT Knowledge Exchange is planning on attending in 2011. If you or your company is planning on attending any of them, we'd love to see you there. Let us know if our schedules match up, or tell us which conferences you are going to. RSA Conference, February...

    MelanieYarbrough6,345 pointsBadges:
  • RSA Adaptive Authentication and PCI DSS 8.3

    I have a client that's concerned that RSA's Adaptive Authentication no longer satisfies 8.3, two-factor authentication when the user is mobile, and not using his registered device. RSA's step-up question authentication and remote user enrollment appears to not be in conformance.

    RDVines5 pointsBadges:
  • Does Microsoft 2008 Terminal Services support 2 level authentication?

    Does Microsoft 2008 Terminal Services support 2 level authentication with things like smart cards or RSA Tokens? This question is from the Microsoft Virtualization Chat on ITKnowledgeExchange.com

    ITKE346,125 pointsBadges:
  • Sharepint 2007 with RSA secureId authentication

    We are implementing sharepoint 2007 and we have a problem because RSA does not support moss 2007. Please! there is any way or work around about this issue?best regards diego.maira@gmail.com

    Dmaira5 pointsBadges:
1

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following