• VPN over dynamic IP address

    I want to host my source code control environment (SVN) on a server at home, accessible through VPN. I have a dynamic IP address. Does anyone have suggestions for hardware (router/servers) and software. Looking to keep a low expense, but something that will get the job done well. I have a Linksys...

    ITKE357,100 pointsBadges:
  • Recover Skype password

    I forgot my Skype password. How can I recover it?

    sylvanna5 pointsBadges:
  • Authentication and authorization issues in e-Commerce

    What are the issues facing authentication and authorization in e-Commerce?

    Mashael19925 pointsBadges:
  • How logjam vulnerability can be tested on IPS?

    Logjam is a vulnerability, Which is related to Diffi-Hellman algorithm, I want to test this vulnerability on IPS, One thing I know is that we are using RSA certificate. So I think we are not vulnerable to this, need to verify it with tool or proper steps. Thank you in advance.

    Janakiram15 pointsBadges:
  • Prevent data leakage via free email accounts

    Is there any way other than Rights management to prevent employees from sending confidential files using free email accounts (Yahoo, Google, etc). I can't disable access to all known free email accounts. There are just too many of them. We already use endpoint security to lock down USB drives.

    Xfpgas0 pointsBadges:
  • Can PCI DSS meet HIPAA requirements?

    Can PCI DSS meet the Health Care Industry's HIPAA requirements?

    syedzafer5 pointsBadges:
  • What are the general threats of cybersecurity?

    In cybersecurity, what are the general threats and counter measures?

    farhat5 pointsBadges:
  • Security features of a videoconferencing system

    Can anyone explain the security features behind a video conferencing system?

    sybile125 pointsBadges:
  • Service of cybersecurity for a company

    What's the service of cybersecurity for a company?

    nazmabd5 pointsBadges:
  • With Windows Update not working (Win7), will the PC be secure using Malwarebytes & Trend Micro AV?

    I have spent about 30 hours trying every Microsoft & 3rd party remedy for loss of Windows Update about 4 months ago. Since I have the premium (paid) versions of Trend and Malwarebytes, it seems I would be safe from security breaches - is this true?

    underH2Odan25 pointsBadges:
  • Someone hacked my computer again

    A few week back I fell into a trap of, "Your computer has been hit with a Virus and we can help you. I was trying to transfer my email from MSN.com to gmail.com. By the time I got done with them $$$$ later. I had to figure it out myself and now have both e-mails, but I only want one and these...

    pauldocrutter5 pointsBadges:
  • iSeries SFTP

    How do you setup for secured FTP? Can the process be automated like normal FTP?

    Mitchb145 pointsBadges:
  • Co-Worker hacking protection

    How can I protect my desktop (especially files and mail) from co-worker hacking? I am sure someone else within the company I work for, is hacking my PC. What can I do to protect my PC, before telling IT?

    GreekStefan35 pointsBadges:
  • How do you scale B to B database and application servers on AWS?

    I am working with a company that is business to business.  The businesses that are our customers are very concerned about their data.  They want to make sure they have max security. I am wondering if it is practical to have a separate application server and separate database for each business....

    jgon915 pointsBadges:
  • Netserver expert anyone?

    I'm trying to access windows folders on a server and I get this error: 'Error exchanging security information... Error Class:1, Code: 5 = Access denied. My passwords do match and I previously accesses these folders. The problem started when I changed my password.

    yaazhisai250 pointsBadges:
  • Techologies used in biometrics

    What are technologies used to develop a biometric application? Is Java is enough or are other languages needed?

    Manjunathhoigegudde15 pointsBadges:
  • How do you know if your computer has been hacked into?

    I have a few error messages coming up on my laptop screen saying someone is trying to hack into your computer. I thought it was just a virus. Does anyone know if it was a virus or was someone really trying to hack in?

    Verynew20 pointsBadges:
  • How can I connect SDK With C#?

    Could you tell me how to connect SDK with C#?! My SDK is gruail.

    chant18130 pointsBadges:
  • Can Dongle not store any data?

    We're in a restricted office space and if the data storage devices are restricted to be carried at work, can dongle be allowed? Can a dongle not store any data?

    RuchiSabherwal5 pointsBadges:
  • Deleted users audit trails in AS/400

    Scenario 1: I have been doing some cleanup of user profiles that have not logged in more than 365 days to satisfy a SOX Compliance issue. I am doing this across all of our Health facilities (57). IT Personnel from one of the facilities is concerned that they would lose the Audit trail for these...

    DCORDERO4725 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following