• How to retrieve passwords in Thunderbird via HDD?

    How does Thunderbird 8 store passwords and how does one retrieve them via HDD? I would usually use NirSoft, but it's not compatible with Thunderbird 8.

    ITKE344,855 pointsBadges:
  • Email security: What does “message opened by mailclient” mean?

    I've recently read that a Belgium MP claimed that her email headers were being read during routing. It also said that the headers had this message "message opened by mailclient". What does this message actually mean?

    ITKE344,855 pointsBadges:
  • Shouldn’t a person just RSA-encrypt the entire document?

    After doing some research on Security, I've finally figured out how to verify if an email / document was actually sent by the "sender". Here's the process I've figured out:The sender gives their public RSA key to the recipient.The sender also uses SHA1 to hash the document.Then he uses his private...

    ITKE344,855 pointsBadges:
  • Is there really a security advantage when it comes to spittling a password?

    I've been reading more and more about the LANMAN (LM) hash and I'm having trouble understanding some of the concepts. Is there really any security advantage when it comes to splitting a password, encrypting the two halves separately, and combining the halves to form one hash? Or is it just more of...

    ITKE344,855 pointsBadges:
  • Questions about our single firewall setup

    We are planning to run the following setup: a firewall between our internal zones and the public internet. Each of our trusted zones use a different VLAN with a 3-layered switch while the DMZ zone is on the firewall itself, trunked to a layer 2 switch on the firewall.Would this setup provide...

    ITKE344,855 pointsBadges:
  • Licensing/pricing options around Forefront Client Security

    What are the licensing/pricing options around Forefront Client Security? This question is from the Microsoft Live Chat which took place on July 13th.

    ITKE344,855 pointsBadges:
  • Recording failed login attempts in security log for Windows XP SP3

    Can we record any other information in the security log about a failed log in attempt on a Windows XP SP3 desktop? And if so what other information and how can we get at it?

    NewnanIT1,110 pointsBadges:
  • Security certificate in Outlook 2003 and 2007

    I am Running Outlook 2007/Outlook 2003 on Windows 7/XP sp3 systems with pop mail from non exchange local e-mail server. The mail servers security certificate expired. I created a new self signed certificate and installed new server certificate on the clients, however I am getting certificate...

    GaryCarlisle25 pointsBadges:
  • Security implications surrouding outbound SSH traffic

    The school that my son goes to blocks outbound SSH traffic. The users inside the network can't use Port 22 / trying to make a SSH connection through another port is also blocked. The reason I was given for this was because it's putting the users inside the network at risk and would allow port...

    ITKE344,855 pointsBadges:
  • Security Implementation

    With the recent spate of news stories about the apparent information assurance/security failures that have come to light as a result of the events that transpired between Aaron Bar and Anonymous, I’ve been discussing security program implementation with my classmates at the Universtity of...

    Packetsneaker20 pointsBadges:
  • User circumventing security

    We have a rogue user who knows more than she should. She can grant herself and other users the authority to access files that are supposed to be secured. Does anyone know of how we can monitor her activity or go back and review what she has done or anything that we can do. We think she may be using...

    Mouse3330 pointsBadges:
  • ChoicePoint CISO says breach not an information security issue

    The CISO of ChoicePoint says the theft of private information on 145,000 from its databases isn't an information security issue because conmen used fraud, not hacking tools or techniques, to get the information. Anyone agree with that? Check it out:...

    Athletica0 pointsBadges:
  • Cross-platform tools for security, monitoring

    What would be some good cross-platform administration tools to use for an environment running Windows OS X and Debian's test release lenny? It is a small business (<200 employees) and the main concerns are being able to perform secure file transfers throughout the system and keeping track of...

    Linux - Ask the Expert270 pointsBadges:
  • How to generate a listing of security information of Win 2003 server folders

    Does somebody know if there is a way to query the Directory database to obtain a listing that includes security and other settings (shares, permissions, etc) of all folders and subfolders of a machine running Win 2003 Server ? Any help or comment will be appreciated.

    carlosdl69,065 pointsBadges:
  • Network Security refresher training

    Hello, I was wondering if anyone can refer me to a good and basically free online network auditing, testing, documentation resource available online. thank you.

    Fwguyus5 pointsBadges:
  • security CheckPoint vs. PIX firewalls

    Dear can any one know which one best technology Checkpoint or PIX?

    Networkfierwall5 pointsBadges:
  • OST files

    We are migrating users from one exchange server to another. the users sit in remote sites and use very slow links to connect to the exchange server. Is it possible to use the old ost on the pc for the new exchange server instead of recreating the ost with the new exchange server, which can take...

    PaulBone10 pointsBadges:
  • THREE (3) Security Concerns

    We have a desktop with Windows XP SP2, Microsoft Office 2003, and a subscription to McAfee Total Protection 2008 that began in September 2007, among other things. We also just purchased a laptop with Windows Vista and Norton's Antivirus/Antispyware 2008 so far. We will eventually install Office...

    JandNLarson55 pointsBadges:
  • What is the best security tool out there to use to manage virtual machines?

    What is the best security tool out there to use to manage virtual machines?

    ITKE344,855 pointsBadges:
  • What is the best way to persuade a security manager to upgrade poorly outdated software/devices?

    I've mentioned security risk, not to mention how upgrading will do a world of good and provide more features to allow us to enhance our tools to make us more productive. I come from an ISP where IT was not a cost center. I may be spoiled, but we are running on Hoary, and everything is manual it...

    Mnemonyss5 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following