• Steps in conducting system audit logs

    Please, I need to ask whose duty is it to check system audit logs between the system auditor & the internal auditor? Secondly, what are the steps in conducting system audit logs?

    Oduguwa5 pointsBadges:
  • How can I get my Facebook password back?

    I could not open a new account on Facebook because the password. I could not open it. How can I get back my password?

    johnjaycob35 pointsBadges:
  • Recover Windows 10 password

    I forgot my password to get into my laptop. It's running Windows 10 and I don't have a reset disk. Can you help me?

    tracy695 pointsBadges:
  • How to secure the host layer in IaaS?

    I would like to know that the security issues of host layer in IaaS. Thanks and Regards, Yex

    Yexlaynaing15 pointsBadges:
  • Crack password in Microsoft Word

    What tools or how to crack password in Microsoft Word?

    clavierz5 pointsBadges:
  • Security in cloud computing

    Even though we have authentication tools for the cloud, why do we have a lack of security in public cloud, private cloud and hybrid cloud?

    saikiranreddy20 pointsBadges:
  • How do I look for malware on my computer?

    I need advice. I know I have malware, or VPN/spyware. I think I got it by a former associate/employee. I have found, on accident, a hidden file. How can I search for these types of files and installations with moderate computer skills. What do I look for?

    TINASHEAVOITA15 pointsBadges:
  • Chrome prints to a PDF, Firefox and Safari say corrupt file

    Hello, A friend of mine can only print to a PDF in Chrome. When he prints to a PDF in Firefox or Safari, Acrobat won't open it, it says it's corrupt. What could be causing this?

    saborsko5 pointsBadges:
  • About acceptable use policy

    What is the reference of an acceptable use policy?

    Leahmae5 pointsBadges:
  • Unlock PC so I don’t have to put my password in

    How would I unlock my PC so I don't have to put my password word each time I sign it?

    janetcorn755 pointsBadges:
  • Use two computers: One for Internet and the other to work offline for safety

    How to I keep my main computer safe from malware by using two computers?

    duanebrown0495 pointsBadges:
  • Equipment needed to start as an ISP

    What is the equipment needed to start as an ISP, both outer and internal?

    kabba175 pointsBadges:
  • Internet security options for online shopping

    What are some strategies a company can use to build and maintain trust in consumers towards internet shopping?

    olufemi15 pointsBadges:
  • Why is it called ISO 14000?

    Can anyone tell me why is it called ISO 14000?

    elangovann5 pointsBadges:
  • Can I turn network routing and switching into a career within the next five years?

    I am a network engineer and I want to proceed with routing and switching but I'm afraid that this career won't be a required Career with the new technology of virtualization and cloud computing. Many thanks in advance. Regards, Yirga Tareke,

    yirgas5 pointsBadges:
  • McAfee Virus Scan Version

    Am running McAfee Agent on Windows Server 2003 and even though my workstations have different RAM capacities the processor's are experience practically the same amount of downtime almost as if McAfee is chewing resources rather than protecting. Help!

    Zhetmasta50 pointsBadges:
  • Which attacks can SIEM detect, but another security product can’t?

    I'm trying to prepare a proposal for a project. I must first find some attacks that security products can't detect and after that by SIEM and customer correlation rules detect them, is there anyone that help me?

    1234567890120 pointsBadges:
  • How to download Avast free antivirus software

    Every time I try to download, I get message "stub cannot download" - I have no idea how to proceed, even though I have purchased Avast's "cleanup" software (which needs the anti virus program to download it!)

    4677405 pointsBadges:
  • My email was hacked – it replies to different email

    I got hacked like 1 year ago and today I get to notice that when I send an email and they try to reply to me it shows a different address the same name but different @. How can I solve this problem? For example, I send an email with this email: unitedstates@yahoo.com Then the people that received...

    aaronmalca20 pointsBadges:
  • Placing a intranet website in the DMZ. Safe?

    I have an old school Cisco network guy. He is claiming best practice for our company intranet website to be placed on the dmz. Is this safe? Knowing the intranet website doesn't need access from the outside in?

    dnddon5 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.