• How can I know if I’ve been hacked?

    Someone I've had an argument with on Twitter threatened to hack my PC and divulge sensitive information. Reliable sources tell me this person is an expert hacker, who has done this before. How can I know if I'm being hacked and how can I protect myself better? I've got basic Avast running on my...

    Roderickz5 pointsBadges:
  • What are vulnerabilities to municipalities offering free Wi-Fi?

    A municipality is considering offering free Wi-Fi in public areas with no security. What are the risks?

    jimherbert375 pointsBadges:
  • What are some of the risks of not securing a DMZ?

    A user has been included in an Organizations DMZ. What are the risks of this and how can damage be prevented?

    MwilaKangwa5 pointsBadges:
  • Methodology to test the applications in the cloud

    As quoted "SaaS vendors may choose to deploy the solution either by using a public cloud vendor or host it themselves. " If the vendor chooses to host it themselves, how to test the security? What methodology will be followed?

    MohdAqeelasif5 pointsBadges:
  • How many ethernet switches do you have?

    Download your exclusive copy of the expert guide, "Ethernet Switches," to find out what real IT pros think of today's top Ethernet solutions. To get your copy, complete this brief survey from TechTarget.

    Michael Tidmarsh34,915 pointsBadges:
  • Tape encryption for IBM iSeries server

    I need tape encryption solution for IBM iSeries 720 server. Do you guys know any solution other than BRMS?

    ashrafpantho40 pointsBadges:
  • What is the use of the “secret” displayed when setting up 2 Factor Authentication?

    Is there a purpose to the 'secret' that is always displayed when I take a picture of the QR code to setup a two-factor authentication on a non-Google site? Do I even need it? If I save it, wouldn't anyone be able to get in with the login code?

    ITKE353,390 pointsBadges:
  • What is the recommended way to enforce authentication and authorization for Heroku Celadon Cedar apps?

    For my identity and access management tool, I've been using OpenAM (for its container based policy agents). But now I need to switch since I believe it doesn't support Heroku Celadon Cedar stack. What's the best way / tool to enforce authentication for cedar deployed applications?

    ITKE353,390 pointsBadges:
  • Using a different signature for external and internal emails in Outlook 2007

    My organization requires us to use a specific signature, including an image, for external emails. Now they would like us to use a different signature for internal emails, without an image. Would this be possible using Outlook 2007?

    ITKE353,390 pointsBadges:
  • Open Wi-Fi or mobile connection safer?

    In a public area like train stations or airports, what would you say is safer: browsing the internet via mobile connection (tethering) or through publicly available Wi-Fi services?

    Wolfgang Dietl135 pointsBadges:
  • How to say when attacker IP address coming from which country and which origin?

    If some country citizen has hacked my server using DDoS attack, how can we find the attackers country name or origin?

    sk945235 pointsBadges:
  • Domain security policy and domain controller security policy

    What is the difference between domain security policy and domain controller security policy?

    Sonu1235 pointsBadges:
  • need to change password of router

    my wouter has 6 character password. my iphone doesn't take less than 8 character. I need to change the password of my netgear router

    Michelle085 pointsBadges:
  • How can I secure my LAN?

    Dear Experts, I need to secure the intranet, recently there were many unknown activities from LAN which were attacking my servers, routers and switches. How do I secure the LAN and users in it from the Internet and from each other?

    rahulkl25 pointsBadges:
  • App to monitor network traffic

    Could someone direct me to an app that monitors network usage while excluding local traffic?  It also has to track traffic that comes directly from the Internet or goes directly there.

    ITKE353,390 pointsBadges:
  • Is PGP encryption available for IBM I

    Is PGP command line encryption of files available for IBM I?

    arfarn105 pointsBadges:
  • Are reversibly encrypted passwords safe?

    I've noticed that in my event log, I keep getting this message when my router tries to use Radius for authentication. """The user could not be authenticated using Challenge Handshake Authentication Protocol (CHAP). A reversibly encrypted password does not exist for this user account. To ensure that...

    ITKE353,390 pointsBadges:
  • Forgot my Skype password

    I forgot my Skype password so is there a way to get it back please?

    binodbhusal5 pointsBadges:
  • How does Google Authenticator work?

    I'm pretty new to Google Authenticator but I understand it's an alternative to SMS for 2Step verification. But the part I don't understand is that how is it possible that it works without connectivity? How can the server and mobile phone sync together to know which code is valid? I would appreciate...

    ITKE353,390 pointsBadges:
  • Is WEP shared key authentication secure?

    I'm pretty new to the security field and I've been reading up on wireless authentication / shared key authentication. It doesn't sound very secure to me. Basically, here's what I figured out: The station sends an authentication request to the access point. The access point sends challenge text to...

    ITKE353,390 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following