What are some of the pros and cons to biometrics
Answer Question | May 25, 2013 2:55 AM
After the recent Spamhaus distributed denial-of-service attack, many DDoS service providers are concerned that targeted attacks are increasing along with bandwidth sizes. What should we do to minimize the threat of impending attacks?
Answer Question | May 20, 2013 12:15 PM
Dear all ! In our company we are using power 720 server for our application. Some of us in the Admin side we have the access to all the objects and can do any changes. But i as a super admin i just want to record all the activities of another person like changes in [...]
Answer Question | May 20, 2013 12:08 PM
AS400 admin, Security auditing
Can someone elaborate on the best practices for access controls?
Answer Question | May 16, 2013 9:49 PM
Security, Security systems
I am a student doing some research on the IT Security Consulting field. I was wondering if I could get a general break down of what the IT Security Consulting field entails and the main services that they offer to companies. Thanks!
Answer Question | May 15, 2013 2:43 PM
Consulting, industry, IT, research, Security, student
I want a lot of information on the title as I have a project on it. Can someone help me get started?
Answer Question | May 15, 2013 8:05 AM
Networking, Networking security, Security
I’ve never installed Wildcard SSL certs before. We want to implement them for our domains/subdomains. When asking the resellers it seems you need to have 1 Wildcard SSL cert PER server, but we use cloud servers & have subdomains residing on different VPSs. Is it possible to use 1 Wildcard SSL cert for subdomains exisiting [...]
Answer Question | May 13, 2013 1:30 PM
Security, SSL, SSL & TLS, SSL Certificates, SSL VPN licenses
Answer Question | May 13, 2013 12:59 PM
Please suggest me some topic/title for my master thesis. I’m going to do my master degree in IT. I’m very confused, which problem should I choose for thesis. I was thinking for smartphone security or something similar. If you can suggest me any useful topic (smartphone or may be other). Thanks in advance!
Answer Question | May 12, 2013 11:57 AM
Security, Security Administrator, Security policy
I’m using Kaspersky Internet security and only 60 days left on it. I want to format my laptop. Is it possible to use the same security code after formatting my laptop?
Answer Question | May 8, 2013 5:43 PM
I have question about public key and private key. If one user sends a message to b, encrypted by public key of b, then how can user b decrypt it using its private key? I mean the public and private key are not different?
Answer Question | May 6, 2013 3:31 PM
Security, Security keys
It’s been a few weeks since I had the discussion tool bar. ITKE development can not replicate the problem. Did you experience this problem? How did you resolve it? Thanks Phil 5/7/13 .. added tags that have nothing to do with this task but might get some attention
Answer Question | May 7, 2013 1:37 AM
AS/400, Database, Development, itke discussion tool bar, Networking, Security
I have developed a web site for connecting to cloud and I’m storing my files in the server which I have bought from a cloud provider (actually it is an instance of that cloud). But I want to store the data which is uploaded by the user to be stored in the cloud i.e cloud [...]
Answer Question | May 1, 2013 6:39 PM
Cloud Computing, Cloud Security, Security
What are the differences among firewalls and routers.
Answer Question | April 30, 2013 8:04 PM
Ok I really need to know how this person is able to find out my information while I’m in an android game app in the games lobby. Any help would be greatly appreciated. I’m not the only one that this person has gotten personal info from on this app. Help!
Answer Question | April 29, 2013 4:15 AM
Android, Hacking, Mobile
I have to do disclouser attack using Java…can I do it? If yes, then please help. How can I do it because I am studing about security and I know what is happening in disclouser attack but I have to practically know it.
Answer Question | April 25, 2013 3:28 AM
Hacking, Hacking tools and techniques, Security
According to the 2013 Verizon Data Breach Investigations Report, authentication-based attacks continue to plague enterprises as 80% of all attacks collected by Verizon (and other partners) were authentication-based. Who’s to blame for these attacks? Well. Tom Bowers, regional security architect at ePlus, says it’s users and their passwords. What can we do to better protect [...]
Answer Question | May 6, 2013 1:06 PM
Password, Security, Security management
I was wondering if you could answer this question for me. I was given access to the HPI system (checks finance on vehicles) over 8 years ago through my employer. I thought this service was a free service as we are in the transport industry. I did 3 personal checks on this system (bearing in [...]
Answer Question | April 24, 2013 11:01 AM
HPI system, Security, Security management
I want to use Local Group Policy Editor to apply group policy to a specific custom security group created using local users and groups snapin for MMC. Is this possible and if so how? If not, than what is the purpose of being to add local security groups. Custom groups do not appear to show [...]
Answer Question | April 24, 2013 9:19 PM
GPO, MMC, Security
Hi, I have renewed the SSL certificate of my iSeries system. While renewing certificate, I haven’t got any option to specify the number of days to renew the certificate. It is getting renewed for 1 year by default. How to increase these number of days for SSL certificate while renewing it. Thanks & regards, Ketan [...]
Answer Question | April 23, 2013 1:53 PM
AS/400, SSL certificate