• PCI compliance rules for storing credit card numbers

    I apologize for the 'newbie' question but does anyone know what the PCI rules to follow are for storing credit card numbers in a database? Can anyone point me in the right direction?

    ITKE376,405 pointsBadges:
  • Would SQL Azure be PCI DSS compliant?

    I'm using a separate Windows Server that is PCI-DSS compliant, is it still compliant if I had SQL Azure hosting the backend? I'm currently only storing permitted values. Thank you very much!

    ITKE376,405 pointsBadges:
  • Storing billing data in a MySQL database: A PCI compliance violation?

    For the past several months, I've been developing a shopping cart and I need to store Name, Billing, Address and Zip Code into a MySQL database. I'm doing this because a returning customer wouldn't have to re-enter billing information. Also, I'm not storing any credit data. Just to ask, am I in...

    ITKE376,405 pointsBadges:
  • How can I get my Yahoo password back?

    It's been many days to use Yahoo mail and I have forgotten the password even not able to reset it manually? I need help?

    ariana12885 pointsBadges:
  • Does anyone know if Apache Tomcat is PCI compliant?

    Would anyone happen to know if Apache Tomcat is PCI compliant? I'm worried if there's any vulnerabilities where credit card PANs are stored. Thank you!

    ITKE376,405 pointsBadges:
  • Anonymous Web access to create documents in a Lotus Domino app

    I have many forms in a Domino app. I want anonymous web users to be allowed to create (and perhaps even edit) a document with one form, not the others. The only thing that seems to work is if I give Anonymous Author with Create rights in the ACL. In which case, the "Write Public docs" with Reader...

    AtishSanyal165 pointsBadges:
  • Data security in cloud computing

    Just asking for your favour for the information regarding how the following process mentioned herewith is maintained/implemented in existing Cloud architectures.Whether the following encryption/decryption of hardware related information for security aspects are followed or not YES/No in existing...

    Shweta98315 pointsBadges:
  • Dtapart file in Firefox

    In case of failure of Firefox during the download of a file using dTa, the file dtapart is still available in the download location, but not usable. Is it possible to complete the download by entering the dtapart file somewhere in data manager?

    Roystar5 pointsBadges:
  • How do I clean my system from viruses

    I think there are viruses in my system but I can't remove them. What should I do?

    GCOOkoye10 pointsBadges:
  • How to enroll in Internet security courses

    Where can I find Internet Security classes, certifications? How to enroll?

    Estudiante1115 pointsBadges:
  • Encrypted files on Synology NAS

    We have a Synology NAS. I'm able to encrypt folders though the web interface. My drive on the NAS is mounted through the interface too. But for security reasons, what would happen if the power is cut and the NAS boots again? Is my folder automatically mounted? Is the key in flash memory or on the...

    ITKE376,405 pointsBadges:
  • Vendor audit program for quality and compliance

    Does Ariba have a vendor audit program which addresses quality and compliance?

    Cschra5 pointsBadges:
  • Proxy server on Twitter

    How do you setup a proxy server on Twitter?

    waldini8810 pointsBadges:
  • Can not open MS Outlook 2010

    Can not open MS Outlook 2010? When outlook tries to open error 20 - proxy server certificate error pops up? What can I do to correct it?

    Reggiecaz5 pointsBadges:
  • Setting up a proxy server

    How do you setup a proxy server?

    waldini8810 pointsBadges:
  • DNS configuration

    Web Filtering is not working, we use the OpenDNS forwarders. When I use nslookup for an internal device, it uses my internal DNS server(s) just fine. If I type a website address in nslookup, it is using the following: hdredirect-lb-399551664.us-east-.elb.amazonaws.com. IP address

    rockchalk695 pointsBadges:
  • Can Metasploit be used for attack simulation in cloud computing?

    Does anyone know if Metasploit be used for attack simulation in cloud computing?

    sukhadabhingarkar15 pointsBadges:
  • How to track network traffic / WPA2 security

    How, in Windows 8, do I view all people who have been using my Wi-Fi to connect? For some reason, my security key keeps getting "flipped" off. When I go to connect to the network, I see the (!) and the message the other people may be able to see what I send over this network. I know Windows 8 is...

    ImSoConfused15 pointsBadges:
  • Maximum protection for Windows 8 laptop

    Hi, I have Windows 8, 2015 BitDefender total security on my laptop & users still manage to get onto my laptop. They stop my vid downloads, they get my passwords, they send mails in my name. Can someone help me on how to protect my laptop? I have an administrator user account & my user...

    Blackbob5 pointsBadges:
  • Is antivirus needed for Windows 8 devices?

    antivirus is needed for windows 8 or not.

    khadka5 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.