• Staff Nurse wanting to get into the security field

    I have realized after 2 yrs of being hacked that I have always had a desire to work with computers. It was because of the continuous hacking I decided it would be in security. I have been a nurse for 30 yrs. I'm not unhappy with my career; it's that I believe I can help the health field and others...

    Futuristic35 pointsBadges:
  • Can hacker transpose messages on MacBook messages app?

    Can a hacker move messages around within a conversation on the messages app on a Mac? And can this be done remotely? For example, can a hacker remotely access my MacBook and move iMessages within the Messages app so that a message that was sent in December appears to have been sent in June?

    affencal5 pointsBadges:
  • Can PCI DSS meet HIPAA requirements?

    Can PCI DSS meet the Health Care Industry's HIPAA requirements?

    syedzafer5 pointsBadges:
  • Is it possible to install a keylogger remotely on iPhone?

    I'm a Java programmer and I want to know if it is possible to hack in to an iPhone with my Java based keylogger which is bind to a picture? If it is not possible how this can be done? (THIS ONLY IS FOR LEARNING MORE ABOUT PROGRAMMING CAUSE I HAVE NO IDEA HOW IPHONE STUFF WORKS)

    sinma5ter5 pointsBadges:
  • Storing the encryption/decryption key for SQL Server in a safe location

    I've got a DB in which i need to store the encrypted values for a column. I use the SQL Server encryption format for encryption. The format is as follows: CREATE MASTER KEY ENCRYPTION BY PASSWORD 'dsagfdsagv418515adsf' CREATE CERTIFICATE 'CERTIFICATE_NAME' CREATE SYMMETRIC KEY 'KEY_NAME' WITH...

    conqueredplanet5 pointsBadges:
  • Should we go ahead with encrypted backups?

    I'm in charge of our department's laptops and now I need to get some sort of automated remote backups started. They would be going to a RAID drive. But the thing is that we don't have a secure vault to hold all of the drives. After talking to my boss, we thought about using some encryption process....

    ITKE359,450 pointsBadges:
  • Recover Skype password

    I forgot my Skype password. How can I recover it?

    sylvanna5 pointsBadges:
  • How to trace and prove who’s hacked my phone

    My phone was somehow accessed by a woman I met asking me to buy my used generator. She then used info from there to hack into my laptop, which uses a Wi-Fi router to get on line. She then began using my bank card to pay her bills, etc. Last year I finally changed my phone # (she was able to turn...

    ImSoConfused5 pointsBadges:
  • How should we backup 20 TB of data?

    At our organization, we have a NAS server that is being used to store photography sessions. Each one has over 100 GB. Each year, it's accumulating 10 TB of data and it's going to keep on growing. We have been backing all this up using tape (LTO-5 tapes with Symantec BackupExec). Since the size...

    ITKE359,450 pointsBadges:
  • Cisco ASA 5505 firewall configuration

    I configured Cisco ASA 5505 firewall configuration. But when I power off firewall, entire configuration is erased. What is the reason?

    HarishG135 pointsBadges:
  • How to disable save as home page?

    How to disable save as homepage from visitor hack our code?

    oneonesip30 pointsBadges:
  • VPN over dynamic IP address

    I want to host my source code control environment (SVN) on a server at home, accessible through VPN. I have a dynamic IP address. Does anyone have suggestions for hardware (router/servers) and software. Looking to keep a low expense, but something that will get the job done well. I have a Linksys...

    ITKE359,450 pointsBadges:
  • Authentication and authorization issues in e-Commerce

    What are the issues facing authentication and authorization in e-Commerce?

    Mashael19925 pointsBadges:
  • How logjam vulnerability can be tested on IPS?

    Logjam is a vulnerability, Which is related to Diffi-Hellman algorithm, I want to test this vulnerability on IPS, One thing I know is that we are using RSA certificate. So I think we are not vulnerable to this, need to verify it with tool or proper steps. Thank you in advance.

    Janakiram15 pointsBadges:
  • Prevent data leakage via free email accounts

    Is there any way other than Rights management to prevent employees from sending confidential files using free email accounts (Yahoo, Google, etc). I can't disable access to all known free email accounts. There are just too many of them. We already use endpoint security to lock down USB drives.

    Xfpgas0 pointsBadges:
  • What are the general threats of cybersecurity?

    In cybersecurity, what are the general threats and counter measures?

    farhat5 pointsBadges:
  • Security features of a videoconferencing system

    Can anyone explain the security features behind a video conferencing system?

    sybile125 pointsBadges:
  • Service of cybersecurity for a company

    What's the service of cybersecurity for a company?

    nazmabd5 pointsBadges:
  • With Windows Update not working (Win7), will the PC be secure using Malwarebytes & Trend Micro AV?

    I have spent about 30 hours trying every Microsoft & 3rd party remedy for loss of Windows Update about 4 months ago. Since I have the premium (paid) versions of Trend and Malwarebytes, it seems I would be safe from security breaches - is this true?

    underH2Odan25 pointsBadges:
  • Someone hacked my computer again

    A few week back I fell into a trap of, "Your computer has been hit with a Virus and we can help you. I was trying to transfer my email from MSN.com to gmail.com. By the time I got done with them $$$$ later. I had to figure it out myself and now have both e-mails, but I only want one and these...

    pauldocrutter5 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following