• Replicate backup to another site

    Hello Experts, I was wondering if there are best practice in terms of operation, security, management that I should follow when start replicating backup data from primary site to another site (I am using data domain and VERITAS).

    Hwahab5 pointsBadges:
  • How to decrypt my phone

    A hacker encrypted my phone. How can I get back control of it? How do I decrypt my phone?

    bluebear825 pointsBadges:
  • Correct password won’t open Excel doc in an attachment

    I have a password protected Excel document. I can open it with the password. When I send it as an attachment, I get a password is incorrect message.

    ronirothstein15 pointsBadges:
  • Unable to access Internet on Surface tablet

    I am able to use Wi-Fi on my surface tablet but unable to access the internet. Keep getting unexpected error has occurred and that troubleshoot is unable to complete task. Have checked with Vodafone and the modem is connecting. Also states that on the tablet. Tablet was working perfectly until...

    Jocelynb5 pointsBadges:
  • Security for SELinux

    What are the securities provided by SELinux and How?

    AnpuAnn1235 pointsBadges:
  • Add security file for updated Firefox version

    When I try to install an updated version of Firefox, I get a notice that I need to add a security file or get permission from security. What are they talking about?

    Snakefoot5 pointsBadges:
  • Why we require DAST and SAST, if secure design review is in place?

    I have a query what does Secure Design review don't cover? Why we require DAST and SAST if secure design review is in place (due to low budget this question is raised).

    Rithin5 pointsBadges:
  • Internet Explorer vs. Firefox

    Hello, I'm the Assistant Editor on SearchWindowsSecurity.com. I'm looking to start a discussion about what browser people are using and why. Also, is anyone considering switching from IE to Firefox, or are your plans to stay with IE? Here's some food for thought... As of Feb. 2005, an estimated 35...

    LMullen0 pointsBadges:
  • Is PING.EXE a virus?

    I saw in my procceses a procces name ping.exe for 2 seconds. Is it a virus?

    8mmppp5 pointsBadges:
  • Apply SFTP on AS/400

    How can we apply SFTP on IBM AS/400 I720?

    BadarMateen5 pointsBadges:
  • Database for insurance auditing system

    Hi everybody, I'm an Oracle developer working on an insurance auditing system. I'm looking for a database that includes the International classification of diseases (ICD10, ICD11) for each diagnosis all of the associated procedures, lab tests and medicines to make the system automatically approve...

    Ahmad0065 pointsBadges:
  • Change Visual Basic security settings

    On Visual Basic, I have several processes running at the moment. Now, I saw that I'm able to change the security settings through Process Explorer but I'm wondering if there's a chance I can do it using the command line.

    ITKE1,015,970 pointsBadges:
  • Cybersecurity

    What is cybersecurity?

    MONIKABHATHEJA5 pointsBadges:
  • Which certs should I take first?

    Hi everyone, completely new here so.. Here goes my question. I'm currently taking a diploma of Cyber and Digital Security, which covers on networking and ethical hacking (all very lightly). After this Diploma, I'm planning to head more into the network and security side (following the steps of my...

    Benjilee5 pointsBadges:
  • Business analyst role/job description

    Hi, What is the standard business analyst role/job description according to COBIT? Thanks and regards,

    cellepel5 pointsBadges:
  • csrss.exe

    Csrss.exe - I looked at this in my task manager, but I cannot click right and find its properties, everything else is fine and all have 'user name' But not this one. I found several copies in other folders but none in system 32 where it is supposed to be. The ones in the other folders all have...

    fcuku210 pointsBadges:
  • Is someone hacking me?

    I am not a technological expert. Through hacking test, I found this IP address 192.168.1.65 and 192.168.1.64 intervening with my privacy however it is shown as private network. No location found. How do we find the hacker?

    Samacha5 pointsBadges:
  • Who hacked my wife’s phone?

    My wife's phone has been hacked. We go to bed and her phone will have new apps downloaded when we wake up. What should we do?

    ShannonRichards10015 pointsBadges:
  • Secure login system for college database

    For my final year project I want to make a secure login system for my college database and lab system. So to implement such things, I want help of experts what can I do. I submitted my topic for Server Security system, but I don't have idea what to do. Please help me

    HarshalShende5 pointsBadges:
  • Antivirus for external hard disk

    I have 1TB external HDD. I want to know if it is possible to install any antivirus in my external hard drive because I might plug it in another computer that doesn't have an update and that has a virus. Which one is good antivirus for external hard drive?

    pdsathishkumar3,790 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

Thanks! We'll email you when relevant content is added and updated.

Following