• What is SFTP?

    I want to know about SFTP. Where should I start?

    KanakDwivedi5 pointsBadges:
  • Open IT Forum: Tell us your must-read IT blog or Twitter feed & earn 50 knowledge points!

    We're always looking for great resources to share with the community, so here's your chance to share what's in your own bag of tricks! Share your favorite IT blogs or Twitter personalities, what they write about, or a link to a post that taught you something you'll never forget. Don't have a...

    MelanieYarbrough6,345 pointsBadges:
  • Microsoft IT Scam

    Is there a simple HoneyPot setup that will allow assisting the detection of the "Microsoft IT Support Scam" instigators? These guys call on the phone monthly to thousands of individuals hoping to get someone to open a remote connection so they can drain private data and install spyware/ransomware....

    TexasGeek5 pointsBadges:
  • Is it secure to connect two hosts from different environments (Production/DMZ) to the same storage and what is the BP?

    Can someone tell me if it's secure to connect two hosts from different environments (Production/DMZ) to the same storage and what is the BP?

    AbuMohammed5 pointsBadges:
  • Gmail keeps detecting suspicious activity when I travel

    I travel a ton for my job but every time I go to a different location, Gmail notifies me that there may be suspicious activity. This is when I try to sign in. Is there a way to stop this? It usually doesn't recognize my password so I can't log in. Thank you for your help.

    ITKE407,720 pointsBadges:
  • Security options for compromised Yahoo mail

    I've been using Yahoo mail for quite some time and when I went into my account this week, Yahoo said it strongly believes that it was compromised. I've already reset the password / security questions. As of today, I don't see any spam. What else should I do?

    ITKE407,720 pointsBadges:
  • Fortigate IPmacbinding is not working

    I have a fortigate firewall(v5.2.3,build670) and I created two interfaces in the firewall. One interface is wired, connected to switch and wired client. Another interface is wireless, connected to fortiap(FortiAP-221C v5.2,build0240,150507). I want to enable ipmacbinding in fortigate firewall,...

    aflyfish703295 pointsBadges:
  • Master password for the Software Security device

    I'm getting a popup (looks like Microsoft format) asking for the master password for the Software Security Device. I never saw until about two weeks ago. Are you aware of a virus using this approach?

    rbres75 pointsBadges:
  • Can corporate data be remotely penetrated through the NAS device?

    How can our corporate data be remotely penetrated through our NAS device?

    mbopha5 pointsBadges:
  • What’s a wildcard SSL certificate?

    What's a wildcard SSL Certificate? Can anyone explain what is the benefits of it?

    KelvinS80 pointsBadges:
  • Digital signature concepts in Java

    how can we perform digital signature concepts in j2me?

    VeeraR10 pointsBadges:
  • Digital or blind signature to avoid side channel attack in cloud computing

    I confused in one point should we choose normal digital signature or blind signature to avoid side channel attack in cloud computing? Can you help me please?

    students201550 pointsBadges:
  • How can I protect my Gmail account?

    My friend recently had his Gmail compromised (someone took viable info from him) so that has me really worried about my account. What should I do to prevent the same thing happening to me? What kind of protection should I use on my account? Thanks!

    ITKE407,720 pointsBadges:
  • Remove Dropbox access from an old computer

    I have several computers and Dropbox is installed on all of them. But as it turns out, I don't have access to one of them anymore so I need to remove access on that computer to my Dropbox account. I already changed the password but it's still installed. I'm a bit worried (from a security...

    ITKE407,720 pointsBadges:
  • Reset password for email

    How can I reset my password for my email?

    bullman15 pointsBadges:
  • Viber voice/video hacking

    Can you hack someone's Viber and record their calls or videos if you have access to their carrier services? let's say someone who might work at AT&T, they give someone else a hand into recording voice calls in my Viber number. Because my viber call disconnects and then show "recording". Please...

    itdontknowhow5 pointsBadges:
  • Gmail: Encrypt emails with GPG

    I'm using Gmail and I need to make my emails encrypted (particularly with GPG). How can I do this? Is there a tool I should use?

    ITKE407,720 pointsBadges:
  • SQL injection attack detection

    How can I find if my site is vulnerable for SQL injection attacks? Can anyone share the tips to prevent it?

    KelvinS80 pointsBadges:
  • How do I encrypt my Gmail?

    I would like to Send a message to other party, but what I am concern about that my message might leak or something like that. So my question is, how do I encrypt my Gmail? Many thanks.

    Ghazwa5 pointsBadges:
  • Implementation single sign-on using Microsoft

    I am supposed to login via web login, desktop, mobile, Proximity Card, Biometrics, IVRS to Web-based Applications / Client Server Applications / Mainframe Applications / .Net Applications / Java Applications / Legacy Applications using single sign-on feature. What are all my prerequisites?

    Swathibala5 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following