• How to brute force attack a password prompt that pops up in my software

    How can I brute force attack a password prompt that pops up in a software program that is being ran on my computer desktop?

    MikeStover5 pointsBadges:
  • How to customize Plone login for two-factor authentication

    I'm pretty new to Plone and Python but I need to customize an existing plone installation login to include two-factor authentication from Duo-Security. Does anyone know the best way to do this? Would there be a Python API for this?

    ITKE354,810 pointsBadges:
  • What is the standard for advance encryption?

    What is the advance encryption standard?

    ANIXILIN1235 pointsBadges:
  • Examine and analyze a digital signature

    How do I examine and analyze a digital signature?

    holsen5 pointsBadges:
  • Best way to scan a server

    What's the best way to scan a server?

    Tahir5665 pointsBadges:
  • How do I create a Windows 8 profile for shared key authentication?

    I've noticed that my Windows 8 won't let me connect to a wireless network that uses WEP with shared-key authentication. I ran Windows 8's network diagnostics wizard and it shows that one exists. The wireless network that you are trying to connect to requires shared-key authentication, a low...

    ITKE354,810 pointsBadges:
  • Is it possible to log out user from a web site if he is using basic authentication?

    Would it be possible to log out a user from our website if he/she is using basic authentication? I already know that killing a session isn't enough because once a user is authenticated, the request contains login information so the user is automatically logged in when they access the site again....

    ITKE354,810 pointsBadges:
  • How does changing your password every 90 days increase security?

    At my organization, I need to change my password every 90 days (and I've been as the company for several years). Is there a specific attack that this is guarding against? Or is it just because "it's the way that it's always been done?" I feel like the only time I should change my password is when...

    ITKE354,810 pointsBadges:
  • Board security awareness & education

    Should corporate boards be required to have representation from the information security domain? Is it a governance issue that security and IT risk management has become critical, yet director's ability to manage this domain has perhaps lagged?

    j2abro15 pointsBadges:
  • Reset password on wireless WGR614

    how do you reset the password

    Ohoylerules5 pointsBadges:
  • Backup with password

    I want to take backup with password but when I want to do it shows me this error: One or more of the options (password) are not supported for this statement. Review the documentation for supported options. So what can I do? To take backup WITH password.

    Shampurna25 pointsBadges:
  • Monitoring software for hardware usage

    Need to determine the best real-time monitoring software for hardware. Would like non-vendor specfic information on usage and suggestions for data placement in Raids and NAS type of storage,along with SOX. This request for help was originally submitted to the Research Assistant on WhatIs.com.

    ResearchAssistant855 pointsBadges:
  • How does Websense work in IT companies

    Hi, In my present organisation the IT policy states that inappropriate and malicious sites will be blocked. In my last organistation I never came across any such site blocking system.So, I have few queries regarding this. I hope those working for companies where site blocking is present would have...

    Meetmeonline210 pointsBadges:
  • Someone has gained access to my PC and Android smartphone

    My ex boyfriend has gained access to my PC and my Android phone, he is in my Facebook, email, SMS, ect. He had used some of my contacts and wrote to me and call me, just like I was them. If I'm with someone, their phone rings and it's my ex!  How does he do that?!  My phone rings and I see the...

    takingcareofproblems5 pointsBadges:
  • Do mobile networks use encryption on SMS when used for two-factor authentication?

    I understand that a ton of two-factor authentication mechanisms use SMS to deliver single-use passphrase to a user. But I'm looking to find out how secure it truly is. Would it be hard to intercept the SMS message containing the passphrase? Do any mobile networks use some kind of encryption on SMS?...

    ITKE354,810 pointsBadges:
  • What are the benefits of federated identity management over public key encryption?

    I just started at a security company and I'm looking to find out if it's better to have a federated identity system (OpenID) instead of a public key encryption. Can anybody explain the benefits of having a federated identity management system? I would appreciate any advice.

    ITKE354,810 pointsBadges:
  • Is Microsoft Forefront Identity Manager 2010 compatible with AD Forest Level 2008 R2?

    Would anyone know if Microsoft ForeFront Identity Manager 2010 is compatible with Active Directory Forest and the domain level of Windows Server 2008 R2? I've been searching but I can't find the answer anywhere. Thanks!

    ITKE354,810 pointsBadges:
  • What’s the best practice to generate random/unique tokens of custom length?

    I'm trying to create an identifier for forgot password. I've tried using a timestamp with mt_rand() but the timestamp isn't unique every time. Is there something I'm missing here? What's the best way to generate random tokens of custom length? Thank you.

    ITKE354,810 pointsBadges:
  • How to hack a proxy server on a school laptop

    How do I get into a proxy server on a school's laptop?

    lordjtet135 pointsBadges:
  • What is the difference between shared key and pre-shared key authentication?

    I'm sorry for the 'homework-type question' but does shared key and pre-shared key mean the same thing in terms of authentication? Does pre-shared mean that it's already been shared by different parties? Thank you for the help.

    ITKE354,810 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following