• How do I generate a Google application-specific password from a shell script?

    I've recently enabled two-factor authentication on Google, but no my Google export scripts aren't working. My computer is verified and trusted but, for some reason, the scripts are not. Basically, every time the CRON job is run, I keep getting this 'Google verification code' and the script fails....

    ITKE361,865 pointsBadges:
  • Changing default password to expire the password when users log in

    I want to change default password to expire the password when users log in. How do I accomplish this?

    DCORDERO4725 pointsBadges:
  • What’s the best way to generate a cryptographically secure token?

    In order to generate a 32 character token for access to our API, we've been using this: $token = md5(uniqid(mt_rand(), true)); But someone told us that this isn't the best way to secure it and that we should use this instead: openssl_random_pseudo_bytes What's the best way here? Thanks for the help.

    ITKE361,865 pointsBadges:
  • How do I set up a PHP password recovery script with a 24-hour token?

    I'm trying to set up a PHP password recovery script, that would use a token but would expire after 24 hours. I'm having trouble setting it up. All I have right now is SHA1 encrypted user passwords but I really need to append a token to the URL that gets sent to the user when they request a password...

    ITKE361,865 pointsBadges:
  • What is the correct way to log out of an HTTP authentication-protected folder?

    Does anyone know of the right way to log out of HTTP authentication protected folder? I understand there are workarounds but they can be dangerous too. Does anyone have a good solution?

    ITKE361,865 pointsBadges:
  • What are the Identity Access Management options in Windows Azure?

    I currently have a mobile application that's been using AWS's IAM infrastructure that allows me to provide temporary access tokens to anonymous mobile devices. This allows them to run queries against AWS services from a mobile device. Would anyone happen to know if Windows Azure has a drop-in...

    ITKE361,865 pointsBadges:
  • How do I create a SAML authentication request using Windows Identity Foundation?

    I'm trying to use an API to create SAML authentication requests and receive/interpret the SAML responses but I'm not sure of the best way to do this. I've figured out how to receive and interpret the responses. Can someone point me in the right direction on using APIs to create SAML requests. Thank...

    ITKE361,865 pointsBadges:
  • Are there any alternatives to multifactor authentication that protect user information as well?

    Does anyone happen to know if there are any alternatives out there to multifactor authentication that will protect user information as well?

    ITKE361,865 pointsBadges:
  • track user of computer online who is using maximum bandwidth in LAN

    Hi All, I am Sandeep and working at one software company as system administrator. Company has 60 users (computers). We have 2 MB land line. It goes through Cisco router and all computer default gateway IP is the router IP. We have a ISA server. Now, I want to online monitor this network that which...

    Kapadane105 pointsBadges:
  • Trying to configure Outlook Web Access on my Exchange 2003 Server which is behind a Cisco PIX firewall.

    I have a question. I am trying to configure OWA on my Exchange 2003 Server which is behind a PIX firewall. I am told the OWA should work by default after I have installed the Exchange server. Mine isn't working. I just don't know if its the firewall or not?

    ITKE361,865 pointsBadges:
  • What is LSARPC?

    We have Windows 2003 Servers as our domain controller. We are facing some problem with CPU utilization. When I captured to traffic using sniffers I figured out a protocol called LSARPC  which is frequently used by clients to communicate with Domain Controllers. I am wondering what is this LSARPC?

    Yasir Irfan5,935 pointsBadges:
  • Why can’t I open this Group Policy object?

    I am unable to open a Group Policy Object. The system cannot find the path specified in Windows Server 2003. I can open about half of the GPOs and edit them, but I can't open the other half. If I rebuild the GPO, it works fine. I have run DCDIAG (Clean), GPOTOOL (Clean), I have checked with ADSI...

    Windows Security ATE160 pointsBadges:
  • Cannot remember admin password on old workstation

    I can't remember my admin password on an old workstation. Is there any backdoor I can use to obtain the password or change it? Can I install another harddrive with an operating system on it and go into the old boot drive and find the password somehow?

    Thebigt15515 pointsBadges:
  • Developing a honeypot system for network administration

    I'm supposed to build a honeypot system for my final year project, since my title is "developing a honeypot system for network administration" I chose the title, becayse its unique, nobody ever has done it in our college yet. But now I'v been reading about it and I'm confused on how to build one....

    Veriya30 pointsBadges:
  • NIC info via script

    Hiya all, I have made a script (Copy and paste from microsoft, then tweak!!!!) to give me certain PC specs, and want to know how to add the NIC information to it, the script gvies me PC name, manufacturer, CPU make, model, speed, RAM, VGA adapter, and i just wanna add the NIC to it. If I can do...

    Carl0s810 pointsBadges:
  • What does RESTful Authentication mean and how does it work? 

    Does anyone know what RESTful authentication means and how it works? I've been searching but can't find much on it. The only understanding that I have is that you pass the session key in the URL. Am I on the right track here? Thanks so much.

    ITKE361,865 pointsBadges:
  • What are the advantages and disadvantages of using key files for web authentication?

    We have a corporate web mail site (that uses PHP and MySQL) for specific users of our company who are working remotely with the web portal. Each user has a password and login. Now, I'm thinking about replacing using text passwords with a key file. Would this type of authentication be more secure...

    ITKE361,865 pointsBadges:
  • What is the most up-to-date replacement for One-Time Passwords?

    I understand that OTP (one-time passwords) are the new generation of password / security techniques but I'm trying to figure out if it's still safe enough or will it vanish soon. If so, what's the new placement for it?

    ITKE361,865 pointsBadges:
  • Memory Stick Virus

    One of my friends' computer has believed to be infected by a virus. Whenever he put memory stick to the computer, following files appeared in the stick: autorun.inf squxe.exe xnvjmz.exe These files can be deleted manually. But when he put that memory stick or other stick, the files appeared again...

    Kwo5 pointsBadges:
  • User profile corrupted when I login to Windows XP

    Every time the user profiles has got corrupted when I login to Windows XP.

    Teamindya5 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following