• Are BYOD programs a security risk?

    According to a recent study by Ovum, 80% of corporate BYOD programs are 'inadequately managed by IT departments.' As more companies allow their staff to use their own computing devices to do work, they're struggling to address the programs that enable corporate control and guidance. How is your...

    Michael Tidmarsh30,660 pointsBadges:
  • Wanted to configure PGP on Oracle applications R12

    Hi, We are currently on Oracle Applications R12 based on Unix Platform.  We have a requirement to encrypt the files using the PGP key and FTP to another server. The other server will require to decrypt these files. Can you please let me know from where I have to start? Do we need any...

    khushbub5 pointsBadges:
  • Creating a user in navigator

    When i try to create a user in Navigator it does not allow me to set the DEFAULT OWNER opion from *usrprf to *grpprf. Does anyone know how to do this in Navigator?

    jjsuthe125 pointsBadges:
  • Analyzing Security Audit Journal

    Hello, could you please tell me where can I find a book, guide or course about Tracking and Analizing Security Audit Journal on iSeries?  I have tried Appendix F on Security Guide but there are not all entries and it does not explain how to analize records in journal.  Thanks a lot

    Fabypaumc15 pointsBadges:
  • How to implement secure file sharing between systems of different security levels

    Typical file sharing can create pathways between the systems of different security levels. I want to provide files (containing no sensitive data) from a secure system so that they can be read from low security systems, without having to ftp through firewalls which have more important duties. What...

    Columgrant15 pointsBadges:
  • QSYSOPR Security

    What is the recommended authority setting to QSYSOPR which prevents users from answering messages? What kind of impact does this have on jobs sending messages to the queue?

    MrChristie0 pointsBadges:
  • Linux database security

    What are the database security requirements in a Linux environment?

    Cnotejunebug20 pointsBadges:
  • Vendor Security Questions

    Hello, I am a student in the Network Security program at the University of Advancing Technology and just read "Plan, Do, Check, Act". The URL is below. https://buildsecurityin.us-cert.gov/bsi/articles/best-practices/deployment/574-BSI.html Years ago everything was stored in the data center and...

    Ad285 pointsBadges:
  • What’s in your network security and troubleshooting toolkit?

    Just curious what tools you have in your network toolkit? I've heard or used snort, TCPDump, NMap, but would love other suggestions

    Michael Morisy8,323 pointsBadges:
  • Interpreting security audit information

    Have switched auditing on for a specific directory in the IFS, information is being collected in the audit journal. Now, how do I actually interpret when a file is deleted? I gleaned I need to look for an LD journal type - when I do a test delete of a file is generates numerous LD types, but I...

    Tinast35 pointsBadges:
  • Data vs. perimeter vs. network security

    A short time ago, author Wes Noonan wrote some tips for SearchWindowsSecurity.com about deperimeterization. He explained how security is always pitted against business needs, and perimeters have become porous because businesses require traffic from SMTP, HTTP or VPNs to pass through the firewall....

    RobynLorusso230 pointsBadges:
  • How to install Windows updates without Open File Security popup

    I deploy Windows updates for new computers with VBScript. With some of the updates Open File Security popup comes up and I can't install the update passively or quietly. How can I do that silently?

    WindowsServerATE335 pointsBadges:
  • Security audit of access within Active Directory 2008 network

    We need to do a security audit to see what users have access to what within our Active Directory 2008 network. Is there a free tool to help with this and possibly reassign permissions based on rules?

    Troubleshooter24755 pointsBadges:
  • Template for creating source code security

    Anyone who has a template in creating a source code security policy? Thanks!

    Arisaquino5 pointsBadges:
  • computer security

    What is a client-side attack and what are its potential effects (impact on confidentiality, integrity, availability) and what methods might be used to get the user to direct a browser to the rogue web server?

    hiwa7110 pointsBadges:
  • SQL 2005 Security to access 2 databases on same server via Stored Procedure

    We are tyring to apply best security practices by only granting EXECUTE security to Stored Procedures connected to a Role and make users members of the role. However the SP needs to access data from another DB on the same server and when trying we receive "SELECT permission was denied on the...

    A00001615 pointsBadges:
  • SSO on the web, 2-factor security

    Looking for a secure authentication and authorization process on WWW - to include federated logon to multiple pages (single sign on behavior) with more security than uid/pwd access - but without issuing a physical device ("something you have")? Some websites are copperating partners - others are...

    Justgottabeaway15 pointsBadges:
  • Has this computer been compromised?

    One of my computers runs a strange set of files that I don't recognize when it boots:bash.exe, curl.exe, uname.exe, sed.exe, rm.exe, tail.exe, cut.exe, awk.exe, cat.exe, chmod.exe, ls.exe, grep.exeI know I haven't uploaded any programs related to these files, so should II be worried about these...

    ITKE346,430 pointsBadges:
  • AES encyption: More secure than SHA1?

    I know this is more of a curiosity but I wanted to get some expert opinions on this. I recently heard someone recommend stepping up from md5ing (not to SHA1) but to AES encrypting the password, which would use itself as the key. Does anyone have any recommendations on if that would be more or less...

    ITKE346,430 pointsBadges:
  • Does adding other programs to a firewall compromise security?

    I'm using Ubuntu 11.04 as a Firewall in SOHO environment with the thought of installing a GUI on it. Is it true that this would be a mistake because I should not run other applications on a firewall. Why is this the case?I just don't understand why putting a GUI on it would affect the "security" of...

    ITKE346,430 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following