• The IT Blog Top 10: Oct. 29, 2009

    10. Choosing a block size when creating VMFS datastores Eric Siebert has written a guide on how to choose the right size for VMFS datastores. 9. How to use command line arguments in VBScript via the Wscript.Arguments Object Jerry Lees explains a helpful VBScript trick. 8. Using VRDP to view...

    ITKE376,220 pointsBadges:
  • What are your thoughts on the implementation of a Demilitarized Zone (DMZ) to limit remote access?

    What are your thoughts on the implementation of a DMZ to limit remote access?

    baba91965 pointsBadges:
  • Security for hacked mobile devices

    For the past two years, I've been hacked on my cell phone, laptop and desktop. Can someone help me with more inept security as the person doing this is very intelligent, a tech and my ex.

    lullaby5 pointsBadges:
  • Pin number to mobile phone mistakenly given

    If someone gets your mobile pin number, what all can they do with that information? How far reaching is that?

    lindyindy5 pointsBadges:
  • Finding source of spoofed email

    How can I find the source the used my email in spoofing?

    bgill55025 pointsBadges:
  • Third party service providers requirement 12.8.2 – does it apply to clients?

    If a PCI compliant service provider hosts his technology to third party clients with the third party having only web access to a portal (with viewing cardholder data/debit/credit card permissions), does the client require to be PCI compliant since all storing/coding/encryption is performed by the...

    Dendeni25 pointsBadges:
  • How do I secure data if I also need to conduct searches on the same data?

    We need to secure PII data like customer names, but we also need to be able to conduct searches on the entire database of customers to see when we are doing matching and merging customer records.  If all of the data is encrypted or tokenized, we are not able to see the actual data to find...

    packman20155 pointsBadges:
  • How to get started with CEH

    Now I'm doing my 12th grade and will finish it this march. Next I have planned to do B.E(EEE), and also wish to learn CEH as in part times. Now my question is completing 12th gives the eligibility to learn CEH or do I have to learn some more before getting started to CEH?

    Andersen5 pointsBadges:
  • Software to securely erase a hard drive

    Is there a software used to securely erase a hard drive and what is the process called?

    DebraNASH5 pointsBadges:
  • How does cybersecurity affect educational institutions

    I am in need of help finding a thesis question. My broad topic is Cybersecurity in educational institutions.

    Rizille5 pointsBadges:
  • Coworker logged into my computer as me

    Coworker had to use my computer. She doesn't have my password and supposedly logged in as a different user. Problem is, my desktop came up and she had access to everything as if she was me. How is this possible? My IT says there is no way she could have accessed my password.

    Amolina515 pointsBadges:
  • Skype Hacking

    When I use skype, my calls are often REDIRECTED to someone else. This happens when I make Skype-to-Skype calls, and also when I make Skype-to-phone calls. They also spoof the id's of my contacts to make Skype-to-Skype calls to harass me. How do they do this? How can I stop them?

    Hayboy30 pointsBadges:
  • Execute HTML with security

    Executing a HTML file with calls for HTTPS URLs seems to ignore the "s". How can I invoke the HTML with security?

    billsvensson5 pointsBadges:
  • PDCA In Action

    I dont know why I can't find my question anymore so I'll post it again.I'm currently a student at the University of Advancing Technology, and in my current class we have been asked to research the PDCA framework and seek some input here. After reading through the PDCA methodology, it seems to me...

    callenza10 pointsBadges:
  • What issues are there with ISO 27002 framework?

    Hey everyone. I am looking for some input into ISO 27002. I am doing a career change for LE (20 years) into IT Security. I think ISO 27002 is the better frameworks because it has both a physical and IT security component to it. The downside is there is a cost to keep both of those up to standards....

    TomTardy5 pointsBadges:
  • Security risk for routers

    Can anyone tell me what's the security risk for routers?

    marcas5 pointsBadges:
  • How to protect a computer without antivirus

    I want to protect my computer without any antivirus. Can I do that?

    mebishnu5 pointsBadges:
  • Master password for the Software Security device

    I'm getting a popup (looks like Microsoft format) asking for the master password for the Software Security Device. I never saw until about two weeks ago. Are you aware of a virus using this approach?

    rbres75 pointsBadges:
  • How to become a penetration tester?

    I am currently 17. I know Python, Perl and X++. I am currently studying for the CEH and CompTIA Linux+. My question is could I grind it out with some network admin intern gig and opt out of pursuing an IT or computer science degree because school really isn't my thing. How can I become a...

    kaminingen5 pointsBadges:
  • How to block Fortiguard web filtering

    How can I block Fortiguard web filtering?

    janchud5 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.