• Methodology to test the applications in the cloud

    As quoted "SaaS vendors may choose to deploy the solution either by using a public cloud vendor or host it themselves. " If the vendor chooses to host it themselves, how to test the security? What methodology will be followed?

    MohdAqeelasif5 pointsBadges:
  • How many ethernet switches do you have?

    Download your exclusive copy of the expert guide, "Ethernet Switches," to find out what real IT pros think of today's top Ethernet solutions. To get your copy, complete this brief survey from TechTarget.

    Michael Tidmarsh40,305 pointsBadges:
  • Tape encryption for IBM iSeries server

    I need tape encryption solution for IBM iSeries 720 server. Do you guys know any solution other than BRMS?

    ashrafpantho40 pointsBadges:
  • What is the recommended way to enforce authentication and authorization for Heroku Celadon Cedar apps?

    For my identity and access management tool, I've been using OpenAM (for its container based policy agents). But now I need to switch since I believe it doesn't support Heroku Celadon Cedar stack. What's the best way / tool to enforce authentication for cedar deployed applications?

    ITKE366,365 pointsBadges:
  • Using a different signature for external and internal emails in Outlook 2007

    My organization requires us to use a specific signature, including an image, for external emails. Now they would like us to use a different signature for internal emails, without an image. Would this be possible using Outlook 2007?

    ITKE366,365 pointsBadges:
  • Open Wi-Fi or mobile connection safer?

    In a public area like train stations or airports, what would you say is safer: browsing the internet via mobile connection (tethering) or through publicly available Wi-Fi services?

    Wolfgang Dietl170 pointsBadges:
  • How to say when attacker IP address coming from which country and which origin?

    If some country citizen has hacked my server using DDoS attack, how can we find the attackers country name or origin?

    sk945235 pointsBadges:
  • Domain security policy and domain controller security policy

    What is the difference between domain security policy and domain controller security policy?

    Sonu1235 pointsBadges:
  • need to change password of router

    my wouter has 6 character password. my iphone doesn't take less than 8 character. I need to change the password of my netgear router

    Michelle085 pointsBadges:
  • How can I secure my LAN?

    Dear Experts, I need to secure the intranet, recently there were many unknown activities from LAN which were attacking my servers, routers and switches. How do I secure the LAN and users in it from the Internet and from each other?

    rahulkl25 pointsBadges:
  • App to monitor network traffic

    Could someone direct me to an app that monitors network usage while excluding local traffic?  It also has to track traffic that comes directly from the Internet or goes directly there.

    ITKE366,365 pointsBadges:
  • Are reversibly encrypted passwords safe?

    I've noticed that in my event log, I keep getting this message when my router tries to use Radius for authentication. """The user could not be authenticated using Challenge Handshake Authentication Protocol (CHAP). A reversibly encrypted password does not exist for this user account. To ensure that...

    ITKE366,365 pointsBadges:
  • Forgot my Skype password

    I forgot my Skype password so is there a way to get it back please?

    binodbhusal5 pointsBadges:
  • How does Google Authenticator work?

    I'm pretty new to Google Authenticator but I understand it's an alternative to SMS for 2Step verification. But the part I don't understand is that how is it possible that it works without connectivity? How can the server and mobile phone sync together to know which code is valid? I would appreciate...

    ITKE366,365 pointsBadges:
  • Is WEP shared key authentication secure?

    I'm pretty new to the security field and I've been reading up on wireless authentication / shared key authentication. It doesn't sound very secure to me. Basically, here's what I figured out: The station sends an authentication request to the access point. The access point sends challenge text to...

    ITKE366,365 pointsBadges:
  • What are the hardware requirements for implementing the FIDO U2F standard? Are there any issues with backwards compatibility?

    I'm thinking about revamping my personal OP-SEC in the near future but I need to make sure that the security token I get will be backwards compatible with the FIDO standard. Would anyone happen to know of what's required of hardware to implement FIDO U2F standard and if xNT is future-proof? Why...

    ITKE366,365 pointsBadges:
  • Outlook web access needs to be accesible via the internet with Exchange 2007 and Outlook 2007

    Exchange 2007 running all roles on a single server and client running Outlook 2007. OWA is working fine on the LAN. I need to make OWA available from the Internet. We don't run ISA Server but do have a fully configurable firewall between the LAN and Internet. Any advice on how to set this up?

    ITKE366,365 pointsBadges:
  • What should I do with this Watchguard Firebox 500? I don’t have the system manager for it

    I was given a Watchguard Firebox 500 today. The model number is F2064N. Apperantly, you need the Firebox System Manager application to manage these devices, which is only available if you have the device actiavated on your watchguard account. Unfortunately, I don't have that. Should I destroy it...

    Ingram871,285 pointsBadges:
  • How can I test a web application for memory leakage?

    How can I test a web application for memory leakage?

    Rajeshqa5 pointsBadges:
  • What ports do I need to open on a firewall for Exchange 2007?

    What ports do I need to open on a firewall for Exchange 2007?

    ITKE366,365 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following