• E-mail hacking

    How can I hack my own e-mail address? Is there software available for this (commercial or freeware)?

    Brainstorm225 pointsBadges:
  • How to Block Chat in the Network

    Dear All, I am wrting this mail to you all, to know if any you have been successfull in Blocking Chats on your networks, and if so, then how have you acheived it? Could you please tell me which Ports to Block for MSN, Yahoo, Rediff, ICQ, Skype. I am using a NetAPPs Net Cache C 1300, and I am trying...

    Komlink0 pointsBadges:
  • Security/ Audit Check list for DB2

    Hi, I'm in the process of hardening the DB2 in Linux and I'm looking for a checklist to help me make sure I don't miss anypoint. Since I'm not an expert on DB2 I would like to have a starting point. I'm looking to make sure I don't leave open doors and also I want ot make sure I don't get an Audit...

    Josec990 pointsBadges:
  • Data vs. perimeter vs. network security

    A short time ago, author Wes Noonan wrote some tips for SearchWindowsSecurity.com about deperimeterization. He explained how security is always pitted against business needs, and perimeters have become porous because businesses require traffic from SMTP, HTTP or VPNs to pass through the firewall....

    RobynLorusso230 pointsBadges:
  • Template for creating source code security

    Anyone who has a template in creating a source code security policy? Thanks!

    Arisaquino5 pointsBadges:
  • User circumventing security

    We have a rogue user who knows more than she should. She can grant herself and other users the authority to access files that are supposed to be secured. Does anyone know of how we can monitor her activity or go back and review what she has done or anything that we can do. We think she may be using...

    Mouse3330 pointsBadges:
  • Unknown Threats

    Apart from honeypots, what are the different methods to find unknown threats which are prevalent? How do I find methods to mitigate them. PS: all the vulnerabilities are known to all the n/w administrators and then can take measures to mitigate attacks but this doesn't happen..Hackers are at least...

    Czarleo0 pointsBadges:
  • What Next?

    We received a notice from NSA saying the specifics on how to handle our encryption program.   The public version has been limited to use of a public key and the software has a built in data integrity algorithm such that any modification of the key disables the use of the software for encryption....

    gailayres15 pointsBadges:
  • vpn through s-box firewall of checkpoint

    i'm try to create a vpn from the internet to my "small buisness server 2003" that act as vpn server without any luck, if i try to connect to my server from the internal network it's work just fine, iv'e mapped the correct ports according to the microsoft article that say to forward port 1723 and 47...

    Drorbenyosef5 pointsBadges:
  • Developing an antivirus (efficient):for Windows:Using VC++

    I am working on a Project for making an antivirus.I have 2 other project parteners. But we don't have an guidance on how to develop the antivirus.Plz give me any relevent Information on this subject.(like components of AV,Algorithms(efficient),methods,general detection & removal of virus).(Also...

    4238830 pointsBadges:
  • Developing an antivirus (efficient):for Windows:Using VC++-2

    I am working on a Project for making an antivirus.I have 2 other project parteners. But we don't have an guidance on how to develop the antivirus.Plz give me any relevent Information on this subject.(like components of AV,Algorithms(efficient),methods,general dection & removal of virus).(Also...

    4238830 pointsBadges:
  • Internet Explorer vs. Firefox

    Hello, I'm the Assistant Editor on SearchWindowsSecurity.com. I'm looking to start a discussion about what browser people are using and why. Also, is anyone considering switching from IE to Firefox, or are your plans to stay with IE? Here's some food for thought... As of Feb. 2005, an estimated 35...

    LMullen0 pointsBadges:
  • End-user awareness education for company newsletter

    I have been given the task of developing user awareness 1-pager fact sheets to be distributed on a monthly basis in our company newsletter and posted on our intranet. I can write these from scratch but was hoping not to have to reinvent the wheel. Help?

    CalendarGirl0 pointsBadges:
  • Tracking the computer or source of an email

    system: Ex 2003 back-end cluster, Ex 2003 Network Load Balanced Front end. Hi there, A user's account has become comprimised. They have since changed their password, but there are a few mails sent from their account that they did not send. Is it possible to find out the source ie PC hostname or IP...

    Maclanachu0 pointsBadges:
  • SAVACTWAIT time on SAVLIB, etc.

    Hi, Has anyone experimented with the SAVACTWAIT time on the SAVLIB command. The default on 120 second seems rather long. What I am looking for is a realistic value based on fact such as that if an object does not become available after 5 second the change that it will become available after 120...

    JohnDavid5 pointsBadges:
  • oracle internet directory application developer’s guide — dbms_ldap_utl sample code doesn’t work

    Hi, all I'm trying to set up Oracle Internet Directory Rel 9. I'm trying to use APIs provided in Application Developer's Guide. I started by copying and trying to run the examples given in the guide. My procedure connects to LDAP, authenticates me, but won't create a user. (Actually, it passes the...

    Paulina0 pointsBadges:
  • ID Theft and National Security

    If it turns out, as I believe, that enemies of the United States are behind a lot of the major ID thefts in the US, that would mean that a lot of money is going to our enemies. Can we therefore surmise that those who mishandle our identity information, by means of their poor stewardship of our...

    InfoSafety75 pointsBadges:
  • Network Connection Freezes

    For some reason, at random, among 20 PCs on my network, in the morning or during the day, the network connection stops responding for both intranet and internet communications. The only solution thus far is to remove the NIC from the Device Manager, reboot the PC, and let Windows XP Pro find the...

    DboiSOBE0 pointsBadges:
  • Best practices involving admin rights for user on user system

    We are currently in the middle of figuring out the approach we are going to take in regard to a user having admin rights on their system. Typcially we set up a new user as an administrator on their system when they are logged into the domain. They don't have a local admin account on the system,...

    Kevins740 pointsBadges:
  • accessing a password-protected hd

    Hello everyone. My brother sent me his hard drive becuase his motherboard crapped out and he needs the data from his hard drive. I plugged it into my computer through an IDE connection and i can see most of the files on the computer. However, the data he needs resides within his "documents and...

    Whobettrthankyle0 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following