• Technical College vs. University

    Hello all- Would it be more beneficial to attend a technical college or university? A certain technical college, ECPI (www.ecpi.edu) in VA, has sparked my interest because they advertise 'they meet with some industry experts to discuss tech trends and what education needs to be put out to keep up...

    NeoCentric0 pointsBadges:
  • How to implement secure file sharing between systems of different security levels

    Typical file sharing can create pathways between the systems of different security levels. I want to provide files (containing no sensitive data) from a secure system so that they can be read from low security systems, without having to ftp through firewalls which have more important duties. What...

    Columgrant15 pointsBadges:
  • Data vs. perimeter vs. network security

    A short time ago, author Wes Noonan wrote some tips for SearchWindowsSecurity.com about deperimeterization. He explained how security is always pitted against business needs, and perimeters have become porous because businesses require traffic from SMTP, HTTP or VPNs to pass through the firewall....

    RobynLorusso230 pointsBadges:
  • computer security

    What is a client-side attack and what are its potential effects (impact on confidentiality, integrity, availability) and what methods might be used to get the user to direct a browser to the rogue web server?

    hiwa7110 pointsBadges:
  • Security Implementation

    With the recent spate of news stories about the apparent information assurance/security failures that have come to light as a result of the events that transpired between Aaron Bar and Anonymous, I’ve been discussing security program implementation with my classmates at the Universtity of...

    Packetsneaker20 pointsBadges:
  • What is the best way to persuade a security manager to upgrade poorly outdated software/devices?

    I've mentioned security risk, not to mention how upgrading will do a world of good and provide more features to allow us to enhance our tools to make us more productive. I come from an ISP where IT was not a cost center. I may be spoiled, but we are running on Hoary, and everything is manual it...

    Mnemonyss5 pointsBadges:
  • Middle ground password security policies

    What password policies are the best without going crazy? We want security but changing passwords 2 times a month is too much. What is a healthy middle ground between security and convenience?

    TeachMeIT975 pointsBadges:
  • IT

    If company A attacks company B, how should the company A address the issue? What is the possible solution?

    RANARANA5 pointsBadges:
  • Question about IT management software

    Hello, I am just wondering if anyone knows of some software available for IT departments, that say is accessible to users through a company intranet site where a user can go in and log an issue or problem with their system which goes into a database, then once the issue is resolved the user can go...

    Natethegreat0 pointsBadges:
  • Monitor Internet bandwidth

    Good day, We are using Windows 2000 Small Business Server in our organization with Exchange, DNS and ISA server configured. 1. I want to monitor the internet usage by the users. 2. I want to take a report on monthly or daily basis how much MB/GB utilized by each user. Thanks for your reply in...

    GiriPrasad0 pointsBadges:
  • How to monitor and manage LAN gateway from a Helius router?

    Hi everyone, I am trying to filter/manage a gateway through a Helius router for directway. We are running Windows 2000 Server with all XP clients, around 50 of them. We have active directory running with the domain controller handing out DNS and DHCP to clients. All clients are pointing to the...

    Kimberley0 pointsBadges:
  • What can we do to better protect ourselves from authentication-based attacks?

    According to the 2013 Verizon Data Breach Investigations Report, authentication-based attacks continue to plague enterprises as 80% of all attacks collected by Verizon (and other partners) were authentication-based. Who's to blame for these attacks? Well. Tom Bowers, regional security architect at...

    Michael Tidmarsh29,480 pointsBadges:
  • Computer misuse

    I was wondering if you could answer this question for me. I was given access to the HPI system (checks finance on vehicles) over 8 years ago through my employer. I thought this service was a free service as we are in the transport industry. I did 3 personal checks on this system (bearing in mind...

    marieg3935 pointsBadges:
  • Strong security measures (hardware and software) for data integrity

    Please help me in choosing how subject would be achieved to defend against hacker attack – especially against information theft and intruders. Critically compare and contrast the different methods (why should i choose certain than others) available...I need it for remote sites and main office.

    DigitalDrop40 pointsBadges:
  • Stopping EMF radiation from a server room for security

    I want to shield one room against EMF emitted by the computers from escaping the room. This is for security of the data, not some crazy health craze. Will a simple faradays cage suffice? Should I ground the cage? What about the power lines and LAN lines and phone lines that could potentially emit...

    bing135120 pointsBadges:
  • Security management

    How a problem of a computer losing its system security can be solved?

    25782515 pointsBadges:
  • Confidential Information Theft

    I suspect a company who is managing my business stealing or at least know private information which they are not supposed to do. Private memo and things. Is there a way for me to detect how they are doing it. Want to catch then red handed.

    rising12510 pointsBadges:
  • SOX Vulnerability Assessment & Audit Prodcuts

    Are there reviews showing SOX Vulnerability Assessment & Audit products? NetIQ seems to show up in a number of security categories(SOX, Mtg, Assessment, Patching), how does it compare to the other products? Thanks for any help & pointers you can provide! Cheers

    WintelEngr0 pointsBadges:
  • vpn through s-box firewall of checkpoint

    i'm try to create a vpn from the internet to my "small buisness server 2003" that act as vpn server without any luck, if i try to connect to my server from the internal network it's work just fine, iv'e mapped the correct ports according to the microsoft article that say to forward port 1723 and 47...

    Drorbenyosef5 pointsBadges:
  • Developing an antivirus (efficient):for Windows:Using VC++

    I am working on a Project for making an antivirus.I have 2 other project parteners. But we don't have an guidance on how to develop the antivirus.Plz give me any relevent Information on this subject.(like components of AV,Algorithms(efficient),methods,general detection & removal of virus).(Also...

    4238830 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following