• PCI Compliance

    Are customer service reps allowed to give out the last 4 digits of a cc used for payment on an account? Or are they only allowed to confirm the information if the customer provides the last 4? If this is a thing, then what law/regulation is it in?

    Asmo155 pointsBadges:
  • How do I generate a secure token for a mobile app to protect its data?

    I recently developed a back end REST API for my mobile application and now I'm looking to implement token-based authentication so I avoid having the user to login every run on the application. My first thought was using basic authentication over SSL. So once the user sends the credentials through...

    ITKE355,660 pointsBadges:
  • ForgeRock Identity Management vs. WSO2 Identity Server: Which is the better open-source IAM solution?

    For the past few weeks, I'm trying to choose one of the Forgerock Identity Management solution and WSO2 Identity server for my IAM solution. These are the features I'm particularly interested in: SSO Policy based access control User identity management Both of these look good but I'm not sure which...

    ITKE355,660 pointsBadges:
  • Can I integrate ReCAPTCHA with Microsoft Forefront Identity Manager?

    Recently at my job, I've been asked to adding a ReCAPTCHA field to our self-service password reset page that's provided by Microsoft's Forefront Identity Manager. But I'm not too knowledgeable about ASP. I've added the ReCAPTCHA control and it is communicating with Google to refresh the page. But...

    ITKE355,660 pointsBadges:
  • What is the difference between RSA and DSA keys?

    I've been generating SSH authentication keys on our Linux/Unix system using ssh-keygen I've been given the choice of creating a RSA of DSA key pair (using -t type). Does anyone know the difference between RSA and DSA keys? Why should I choose one over the other?

    ITKE355,660 pointsBadges:
  • PCI 6.6 requirment

    Which solution can fill the PCI 6.6 requirement?

    Shuli5 pointsBadges:
  • Setting up file authentication in Oracle 9i

    How can we set up a file authentication in Oracle 9i?

    989986944515 pointsBadges:
  • How to brute force attack a password prompt that pops up in my software

    How can I brute force attack a password prompt that pops up in a software program that is being ran on my computer desktop?

    MikeStover5 pointsBadges:
  • How to customize Plone login for two-factor authentication

    I'm pretty new to Plone and Python but I need to customize an existing plone installation login to include two-factor authentication from Duo-Security. Does anyone know the best way to do this? Would there be a Python API for this?

    ITKE355,660 pointsBadges:
  • What is the standard for advance encryption?

    What is the advance encryption standard?

    ANIXILIN1235 pointsBadges:
  • Examine and analyze a digital signature

    How do I examine and analyze a digital signature?

    holsen5 pointsBadges:
  • Best way to scan a server

    What's the best way to scan a server?

    Tahir5665 pointsBadges:
  • How do I create a Windows 8 profile for shared key authentication?

    I've noticed that my Windows 8 won't let me connect to a wireless network that uses WEP with shared-key authentication. I ran Windows 8's network diagnostics wizard and it shows that one exists. The wireless network that you are trying to connect to requires shared-key authentication, a low...

    ITKE355,660 pointsBadges:
  • Is it possible to log out user from a web site if he is using basic authentication?

    Would it be possible to log out a user from our website if he/she is using basic authentication? I already know that killing a session isn't enough because once a user is authenticated, the request contains login information so the user is automatically logged in when they access the site again....

    ITKE355,660 pointsBadges:
  • How does changing your password every 90 days increase security?

    At my organization, I need to change my password every 90 days (and I've been as the company for several years). Is there a specific attack that this is guarding against? Or is it just because "it's the way that it's always been done?" I feel like the only time I should change my password is when...

    ITKE355,660 pointsBadges:
  • Board security awareness & education

    Should corporate boards be required to have representation from the information security domain? Is it a governance issue that security and IT risk management has become critical, yet director's ability to manage this domain has perhaps lagged?

    j2abro15 pointsBadges:
  • Reset password on wireless WGR614

    how do you reset the password

    Ohoylerules5 pointsBadges:
  • Backup with password

    I want to take backup with password but when I want to do it shows me this error: One or more of the options (password) are not supported for this statement. Review the documentation for supported options. So what can I do? To take backup WITH password.

    Shampurna25 pointsBadges:
  • Monitoring software for hardware usage

    Need to determine the best real-time monitoring software for hardware. Would like non-vendor specfic information on usage and suggestions for data placement in Raids and NAS type of storage,along with SOX. This request for help was originally submitted to the Research Assistant on WhatIs.com.

    ResearchAssistant855 pointsBadges:
  • How does Websense work in IT companies

    Hi, In my present organisation the IT policy states that inappropriate and malicious sites will be blocked. In my last organistation I never came across any such site blocking system.So, I have few queries regarding this. I hope those working for companies where site blocking is present would have...

    Meetmeonline215 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following