• My program is being blocked by my antivirus software (AVG)

    I recently created a program that I've been working on that downloads files. It's been working fine until a user is using AVG. It seems that in order to fix the issue, AVG's "Email Protection" must be disabled. I've already tried adding either my program or the JRE to an exceptions list. It doesn't...

    ITKE344,740 pointsBadges:
  • Skipped Items

    Why when I run a full scan, there is a large number of, "skipped items"? Does this mean that these items are not being evaluated for possible viruses?

    jackkrol5 pointsBadges:
  • How do I make sure someone isn’t stealing my password?

    I travel a lot for my company and have been doing some work in third-world countries lately. I've been using the Internet at different Internet cafes and I'm worried about if anyone could have stolen my password or listen to my keystrokes. I've heard one way to get around that would be to write...

    ITKE344,740 pointsBadges:
  • Trying to figure out if my email will be routed securely

    I'm trying to connect to my email server via SSL (SMTP/SSL) and I know the recipient also only checks his email via SSL (web/https or IMAP/SSL). Does anyone know if this increases the security for the message content in any way? What I mean is will the communication between my providers email...

    ITKE344,740 pointsBadges:
  • Why does my organization make us change our password every 90 days?

    The company I work for makes us change my password every 90 days. I know this is commonplace for many organizations but I'm trying to find out if there is a specific vulnerability that it's designed to counter. Or is it just good practice to be done?I know it's a general security question but it's...

    ITKE344,740 pointsBadges:
  • Password error

    please help me solve my wifes answering book turbo pascal. I'm not expert to this field but I'm trying to study it myself. i cant solve this one. here it is: Write a program that have a password, and if the password enter 3 times is failed, it will appear 'error'. I would greatly appreciate those...

    haroldbolambao5 pointsBadges:
  • Edge Router Firewall Question

    Is there a reason why I should run VPNs and Reflexive ACLs on a firewall with NAT + routing functions on the router, if the router alone can take care of it?

    ITKE344,740 pointsBadges:
  • Is there a way to detect antivirus program using C#?

    I might have a virus problem with one of my machines so I'm trying to figure out if there's a way to detect an antivirus software inside of it using C#. I understand that the Security Center detects software but is there a way using C#? Thanks for all the help!

    ITKE344,740 pointsBadges:
  • My software is being detected as a virus

    I've recently created a program but after a few hundred downloads, my Nod32 antivirus is detecting it as a Win32/Agent.NFIWJLP trojan. Can someone help me before my program doesn't get deleted by the antivirus software? My program mimics the user's interactions with the PC at a scheduled time....

    ITKE344,740 pointsBadges:
  • Why is this suspicious VMware connection bypassing my firewall?

    I'm currently using VMware 5 and I've noticed recently 2 connections are appearing when I start it up. TCP 10.100.100.161:55555->as-40816.engx.vmware.com:https (ESTABLISHED) TCP 10.100.100.161:55556->a184-85-99-51.deploy.static.akamaitechnologies.com:https (ESTABLISHED) But the problem is...

    ITKE344,740 pointsBadges:
  • Are older viruses removed from virus definition files?

    I already know that anti-virus software receives updates from virus definition files (which contains patterns used to identify viruses). But with the size of updates growing frequently each time, I'm wondering in order to limit the size of the updates, do AV companies remove older viruses from...

    ITKE344,740 pointsBadges:
  • Why do we trust email for password resets?

    Since email is considered insecure why do we trust it for password resets?

    ITKE344,740 pointsBadges:
  • Password encryption: WEP, WPA and WPA2

    I'm pretty much a beginner when it comes to security but I do know that there are pretty much three different methods when it comes to Wi-Fi security: WEP, WPA and WPA2. My question is this: Does one method have better "strength" when it comes password encryption? Or are they pretty much all the...

    ITKE344,740 pointsBadges:
  • Error message ‘Program is trying to send an email on your behalf’

    I am using MYOB to email payslips and get the message "a program is trying to send an email message..." how do i set outlook to do this automatically so i dont have to hit 'allow' for each email

    Natmaher5 pointsBadges:
  • Is a local firewall actually necessary?

    I'm not a security expert but is having local firewalls (enabled on different machines) necessary if you're already running hardware firewalls, like Netgear, that controls in/outbound connections?Does it just added another layer of protection? Thanks!

    ITKE344,740 pointsBadges:
  • How do I find out what type of encryption is being used?

    I am testing a web application which stores the password in the database in an encrypted format. How do I determine what hashing or encryption is being used?

    ITKE344,740 pointsBadges:
  • Can TLS prevent my ISP and others from spying on me?

    Is it possible to use TLS exclusively to secure my email, http servers and desktop client, for everything including email, in/out:80 and web surfing/entertainment browsing? My goal is to prevent my ISP and others from spying on my activity.

    ITKE344,740 pointsBadges:
  • Egress Filtering

    What are the pros and the cons of egress filtering when referring to the network of a medium-sized software business? From what I understand the use of egress filtering will cause issues for some users as it requires policy changes for all new software. But does that annoyance outweigh the...

    ITKE344,740 pointsBadges:
  • Security differences: Proxy vs. Firewall

    I've been doing some security research for one of my coworkers and I figured out that putting a 'proxy' refers to that "man in the middle" by allowing/denying access to certain resources.In terms of security, does proxy add added security (compared to a firewall)?

    ITKE344,740 pointsBadges:
  • Do Windows antivirus tools use API Hooking to protect files?

    From what I understand, antiviruses hook to a file, accesses it and scan the files, and if necessary, make the file inaccessible to protect the system. Is this done via API hooking or some other methodology?

    ITKE344,740 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following