• Should the design cycle of new products include an analysis of security vulnerabilities?

    Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 Black Hat 2013 was a tension filled affair.In addition to National Security Agency Director General Keith B. Alexander defending U.S. surveillance of American citizens, claiming it's a necessity in a world threatened by what...

    Chris Leonard4,300 pointsBadges:
  • CCD camera to work on Emerson 32 LCD

    I have a day & night color CCD camera 1352w qsee that will not work on my Emerson EC320EM2 television? I have all the wire and power sources. What do I need to do?

    chicanolove10 pointsBadges:
  • Port security for Switches

    Switch(config)#interface fastEthernet 0/1 Switch(config-if)#switchport port-security Command rejected: FastEthernet0/1 is a dynamic port. Why is that happening?

    Shiko15 pointsBadges:
  • How to disable save as home page?

    How to disable save as homepage from visitor hack our code?

    oneonesip30 pointsBadges:
  • How to trace and prove who’s hacked my phone

    My phone was somehow accessed by a woman I met asking me to buy my used generator. She then used info from there to hack into my laptop, which uses a Wi-Fi router to get on line. She then began using my bank card to pay her bills, etc. Last year I finally changed my phone # (she was able to turn...

    ImSoConfused15 pointsBadges:
  • Support Staffing Levels for MDM/MAM delivery

    Are there any industry standard models available that map the amount of support staff that are required to support an MDM/MAM delivery using iOS DEP and MobileIron?

    arcdp15 pointsBadges:
  • Web App Security

    Why HSTS header are not being used even in most secure web applications i.e. banking domains while it is recommended for best security practice?

    sammeermalik5 pointsBadges:
  • How to remove spyware

    Hello, I recently had somebody tracking me with apparently spyware. I don't understand a lot of this technology and I need some help trying to get it off. Please explain to me what I need to do. I need help please. Thank you!

    Misnicbut5 pointsBadges:
  • Runaway logon

    My logon userID is somehow automatically logging on behind the scenes and causing me to become disabled. I changed my password yesterday, don't know if this has something to do with it. Help.

    HappyFriday15 pointsBadges:
  • SDN NBI security issues

    What are the open security issues or weaknesses in northbound interface of Software defined networks?

    ankitadubey15 pointsBadges:
  • Outlook web security

    I updated the S/MIME for Outlook Web access and now I can't paste text into a message. In some browsers I can paste, but Hyperlinks are removed. How can I fix this or uninstall the S/MIME?

    Mahonmobile5 pointsBadges:
  • Change Password in profile

    How do I change my password? How do I get to "My Profile"?

    VeryPerplexed15 pointsBadges:
  • What is the standard for advance encryption?

    What is the advance encryption standard?

    ANIXILIN1235 pointsBadges:
  • Can’t login and forgot my password

    I can't login. I forgot my password. What can I do?

    Marianmacdonald5 pointsBadges:
  • What are the type of proxy firewalls exists?

    Is it possible for you to share the type of proxy firewall products currently available in the market. I failed to nail them.

    DRitesh5 pointsBadges:
  • Computer is being hacked

    My computer is being hacked. What should I do?

    Secretary135 pointsBadges:
  • Scan computer so my computer won’t be infected by malware / hacking program

    Is there a program that can scan my computer that I can buy and install on my computer that WON'T become infected with any malware of hacking program that may already be on my computer? I have this consistent problem of antivirus becoming infected then won't detect a problem. Every once in a while...

    Kim443100 pointsBadges:
  • NAT64 end-to-end security

    How can I offer end-to-end security for NAT64 translation?

    GODIS2G2D10 pointsBadges:
  • 2016 Encryption Protocols and the OSI Model

    There are many encryption protocols in use in today's networks. Both symmetric and asymmetric encryption protocols are used for various purposes (IPsec, SSL/TLS, SSH, S/MIME, OpenPGP/GnuPG/PGP, Kerberos, etc.) and then there are protocols like RPC that use some sort of encryption to protect email...

    neil5 pointsBadges:
  • Should I move into the web application security field?

    I am currently working on network security devices like firewall and my work requires me to work 24*7. I want to move into a field where 24*7 is not required. Is web application security a good and relevant field?

    vanipatel220915 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

Thanks! We'll email you when relevant content is added and updated.

Following