• Forgot Password for iMac

    I forgot my password for my iMac and it doesn't provide a 'FORGOT PASSWORD" option. How can I reset it if I don't remember the original password?

    dneway5 pointsBadges:
  • AS/400 Secure FTP on V4R3

    I need to know if our AS/400 V4R3M0 can perform secure FTP. If not what version and release do I need to upgrade to.

    Pamtobin35 pointsBadges:
  • Do any browsers have support for pre-shared-key encryption/authentication?

    My partner and I already have a web application with highly valuable business data. All of our communication is encrypted through TLS/SSL. I know this is a safe protocol but it can still be compromised if someone installed a CA certificate through our computer. So we're trying to strengthen the...

    ITKE364,120 pointsBadges:
  • What is the use of the “secret” displayed when setting up 2 Factor Authentication?

    Is there a purpose to the 'secret' that is always displayed when I take a picture of the QR code to setup a two-factor authentication on a non-Google site? Do I even need it? If I save it, wouldn't anyone be able to get in with the login code?

    ITKE364,120 pointsBadges:
  • How is FIDO U2F different from OTP?

    I recently saw that Google and Yubico announced the availability of cryptographic security tokens, after the FIDO U2F specification. I'm curious to find out if this is just another two-factor authentication or is it significantly better than SecureID or TOTP. Can anyone share their opinion....

    ITKE364,120 pointsBadges:
  • How to Practice Properly for Security+ Certification?

    I have given CompTIA security+ online exam once but I wasn't able to clear that. Please let me know the best methods for preparing for CompTIA Examination

    XtremeNavi15 pointsBadges:
  • Oracle In Linux

    How can I able to get and work with Oracle in Linux platform. I am using RedHat Linux 9.0.

    Samachar0 pointsBadges:
  • What do you think about Privatoria.net? Can I trust them?

    I found such interesting security service Privatoria.net. It is a complex of secure services such as VPN, Anonymous E-mail, Secure chat, data transfer, etc. But I don't know if I can trust them. What do you think?

    MinerAnonym15 pointsBadges:
  • Block Site for employees in office

    Hello, I have to block some sites for employees in my office. How do I do that?

    talha1235 pointsBadges:
  • non-existant ei_209.msi file in Windows XP

    While attempting to re-install Eset NOD32 anti-virus software on a clients computer with Windows XP, installation fails due to "a network error while attempting to read from the file: C:\WINDOWS\Installer\ei_209.msi" I have searched said subdirectory and found no such file.  Running their stand...

    mbs27535 pointsBadges:
  • Don’t give users DomainAdmin rights

    I would like to give highest privileges to some of my IT users on the AD, but don't want to give them DomainAdmin rights. What are potential built-in groups that can achieve that target? Thanks!

    Tguedda5 pointsBadges:
  • SIP trunking issue: Authentication problems (CUCM and own developed PBX)

    Hey, I have built a PBX by using the Ozeki SDK and and want to connect it to my existing Cisco Unified Communications Manager PBX by using SIP trunking. By following the instructions of this Cisco setup guide, I have successfully connect the SDK to CUCM, but SIP trunking does not work, because of...

    RajeshCO275 pointsBadges:
  • Which security certification should I go for?

    I am working as Linux Admin and have 6 years of combined experience in system administration (Linux & Windows), network administration (routers, switches and firewall). I want to move on to security field. Which certification/course I should go for?

    nileshdc820 pointsBadges:
  • How to use deadlock handling

    How can I use deadlocking handling? Is this a legitimate security method?

    priyarapolu5 pointsBadges:
  • Authority to view a user profile

    I want to grant authority to our technical support personnel to see a user profile. How can I do this without giving them *ALLOBJ authority, or granting them object authority against each individual user profile?

    KDCKnowlton5 pointsBadges:
  • Make SSL faster with Apache 2.4 and Linux CentOS 6

    colleagues!   Well, I am with a huge problem with the speed of SSL Authentication. Since I move my website to SSL, the GoogleBot reduce the indexing of my website, because the SSL Negotiation is with below value I got with WebPageTest.org:   URL:...

    espack5 pointsBadges:
  • How can I prove if I’ve been hacked?

    Hi, I have a Huawei Wi-Fi type HG523E home gateway and I'm suspicious over my national telecom company technician being hacked. I see my MAC address from the label device is different from when I detect with other third party software. Then sometimes, a few days ago, when I type Google.com but the...

    Lither5 pointsBadges:
  • Contingency plannning

    What is a the high-level plan for handling contingencies?

    Shomwele5 pointsBadges:
  • What is a hacker?

    Can someone tell me what is a hacker?

    Qinelinkosi5 pointsBadges:
  • Algorithm for removing the viruses

    Hi, I am looking for the name of algorithm that the antivirus software use it for "Removing" the viruses not for detecting. I just found a lot of algorithms for detecting the viruses, but I really want to know the process after detect a virus. Thanks in advance, Amjad

    AmjadAmer5 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following