• How does changing your password every 90 days increase security?

    At my organization, I need to change my password every 90 days (and I've been as the company for several years). Is there a specific attack that this is guarding against? Or is it just because "it's the way that it's always been done?" I feel like the only time I should change my password is when...

    ITKE363,975 pointsBadges:
  • Board security awareness & education

    Should corporate boards be required to have representation from the information security domain? Is it a governance issue that security and IT risk management has become critical, yet director's ability to manage this domain has perhaps lagged?

    j2abro15 pointsBadges:
  • Reset password on wireless WGR614

    how do you reset the password

    Ohoylerules5 pointsBadges:
  • Backup with password

    I want to take backup with password but when I want to do it shows me this error: One or more of the options (password) are not supported for this statement. Review the documentation for supported options. So what can I do? To take backup WITH password.

    Shampurna25 pointsBadges:
  • Monitoring software for hardware usage

    Need to determine the best real-time monitoring software for hardware. Would like non-vendor specfic information on usage and suggestions for data placement in Raids and NAS type of storage,along with SOX. This request for help was originally submitted to the Research Assistant on WhatIs.com.

    ResearchAssistant855 pointsBadges:
  • How does Websense work in IT companies

    Hi, In my present organisation the IT policy states that inappropriate and malicious sites will be blocked. In my last organistation I never came across any such site blocking system.So, I have few queries regarding this. I hope those working for companies where site blocking is present would have...

    Meetmeonline215 pointsBadges:
  • Someone has gained access to my PC and Android smartphone

    My ex boyfriend has gained access to my PC and my Android phone, he is in my Facebook, email, SMS, ect. He had used some of my contacts and wrote to me and call me, just like I was them. If I'm with someone, their phone rings and it's my ex!  How does he do that?!  My phone rings and I see the...

    takingcareofproblems5 pointsBadges:
  • Do mobile networks use encryption on SMS when used for two-factor authentication?

    I understand that a ton of two-factor authentication mechanisms use SMS to deliver single-use passphrase to a user. But I'm looking to find out how secure it truly is. Would it be hard to intercept the SMS message containing the passphrase? Do any mobile networks use some kind of encryption on SMS?...

    ITKE363,975 pointsBadges:
  • What are the benefits of federated identity management over public key encryption?

    I just started at a security company and I'm looking to find out if it's better to have a federated identity system (OpenID) instead of a public key encryption. Can anybody explain the benefits of having a federated identity management system? I would appreciate any advice.

    ITKE363,975 pointsBadges:
  • Is Microsoft Forefront Identity Manager 2010 compatible with AD Forest Level 2008 R2?

    Would anyone know if Microsoft ForeFront Identity Manager 2010 is compatible with Active Directory Forest and the domain level of Windows Server 2008 R2? I've been searching but I can't find the answer anywhere. Thanks!

    ITKE363,975 pointsBadges:
  • What’s the best practice to generate random/unique tokens of custom length?

    I'm trying to create an identifier for forgot password. I've tried using a timestamp with mt_rand() but the timestamp isn't unique every time. Is there something I'm missing here? What's the best way to generate random tokens of custom length? Thank you.

    ITKE363,975 pointsBadges:
  • How to hack a proxy server on a school laptop

    How do I get into a proxy server on a school's laptop?

    lordjtet135 pointsBadges:
  • What is the difference between shared key and pre-shared key authentication?

    I'm sorry for the 'homework-type question' but does shared key and pre-shared key mean the same thing in terms of authentication? Does pre-shared mean that it's already been shared by different parties? Thank you for the help.

    ITKE363,975 pointsBadges:
  • How do I implement Single Sign-On in a Java application?

    I've started working with Java applications and I'm trying to implement a single sign-on and federation in my application. Basically, I want to implement claims aware application in Java. What's the best way to do that?

    ITKE363,975 pointsBadges:
  • Vista & AS/400 conflict

    I am having problems trying to access the internet on a PC running vista that is also used s an AS/400 terminal. Supposedly the IT guy at work says it can't be done and we will have to wipe vista off and install XP instead. the AS/400 is tied in to the LAN port and I am trying to access internet...

    Rktech5 pointsBadges:
  • Source control apps?

    There is no source control/versioning at the company I just started working for. I've worked with CVS before, but does anyone have any suggestions of better applications for this purpose? My company works primarily in web development on several different systems/development frameworks.

    Chunter110 pointsBadges:
  • Monitoring Windows server 2003 task manager

    How can I monitor the status of a Windows 2003 task manager over a period of time like for a month on my server?

    TeachMeIT975 pointsBadges:
  • How do I create a one-time password generator for a phone?

    Over the past few weeks, I've been trying to make a one-time password generator for a phone. In the RFC2289, it says I must fold the output of the MD5. I've been using bouncy castle MD5 and I'm having issues on how to fold the byte array output. Here's what I have so far: for (int i = 0; i < 8;...

    ITKE363,975 pointsBadges:
  • NetApp DataFort and PCI Compliance

    Does NetApp DataFort meet current PCI requirements?

    ClaireS5 pointsBadges:
  • What is the difference between Federated Identity and Single Sign On authentication methods?

    Can anyone explain the difference between federated login and single sign-on authentication methods? Thank you very much.

    ITKE363,975 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following