• Tools for analyzing honeypots data

    What tools are available to analysis honeypots data?

    mazizytambo5 pointsBadges:
  • Java security project for small organization

    As part of learning and implementing Java, I would like to work on security aspects. How can I build a project in Java that works on security features for my small organization (10 employees)?

    nitudshah25 pointsBadges:
  • VTC and Audio Conference Hacking

    I work in the audiovisual integration and technology industry and have very little knowledge regarding network and IT security. My boss has asked that I research the potential security risk that our integrated systems face and what we can do to mitigate those risks. Primarily our concern is whether...

    darennest1215 pointsBadges:
  • Exchange 2007 error 12019

    Hi guys, After installing new SSL certificate, I start getting error 12019 on Exchange 2007 and 12014 12015 on edge its all related to certificate. Can anyone help me resolving this?

    samary200915 pointsBadges:
  • Trend Micro Exams

    Hey guys going to do the Trend Micro Exams they sound pretty easy ,but the foundation exam seems a bit strange any ideas ??

    Maurice15 pointsBadges:
  • How can I access my files?

    I downloaded a zip folder which was supposed to generate its password from https://magafiles.com/329953?password=ea998f30656755cb940d1448d3c801e1 But it keeps saying there is no offer available. So I would like help on how to bypass the password and access my files.

    Grim1015 pointsBadges:
  • How to change password to open PC

    Can anyone tell me how to change my password so I can open my PC?

    YWH4ever5 pointsBadges:
  • Is my computer keeping me safe by having the network sharing option off?

    I am unable to go on websites I use to go on, my computer says they are not certified, yet earlier this year I didn't have any trouble going on them. No signs that I was unable to go on them. I used to have network sharing, I am not sure how it got turned off.

    dgdenisemedspec15 pointsBadges:
  • Risks for IT infrastructure assessment

    Dear All, I need your help! My administration wants to hire a 3rd party IT company to come and assess our IT infrastructure. I'm just not feeling "OK" with that because of all the security risks that may occur. I've worked for this company as a systems administrator for many years now, and frankly...

    Cuterido5 pointsBadges:
  • SSO Server Setup

    Hi, I am very new to SSO and I want to learn how I can create my own server. Are there any tutorial guides in setting one up? Any helpful information would be a great help. Thank you.

    weajane015 pointsBadges:
  • Login to Entone STB using Port 10022 with SFTP

    I'm trying to login to Entone STB using port 10022 with SFTP, don't have a username or password. What should I do?

    hotlawx5 pointsBadges:
  • Cannot install Quick Heal Pro antivirus

    When I try to install antivirus Quick Heal Pro, it says an MSI installation is already in progress so can not proceed. What can I do?

    RajanSharma5 pointsBadges:
  • Remove system BIOS password

    How can I remove the password on my system BIOS?

    rachaeLMyungsoo5 pointsBadges:
  • How to hack a Twitter account?

    What programs do I need to hack? Can I hack a Twitter using my phone?

    Mitchiga045 pointsBadges:
  • Firewalls for faster data transfer speed

    Which firewall allows for a faster data transfer speed? Firewall included with anti virus program or wired router w/ firewall rules?

    James20165 pointsBadges:
  • BCM vs. Risk Management

    While introducing GRC, all the risks are taken in to consideration & countermeasures are defined, why we need BCM separately?

    SanjayBirari15 pointsBadges:
  • How to disable save as home page?

    How to disable save as homepage from visitor hack our code?

    oneonesip30 pointsBadges:
  • What do you think will be the biggest pain for Security Managers in 2017 and beyond?

    Especially in this environment, what do you think will be the biggest professional pain to overcome?

    alexdresn15 pointsBadges:
  • Why is Internet Explorer saying my HTML file is a security risk?

    Our script usually creates a HTML log that has JavaScript embedded in it. But when I try to open it in Internet Explorer, we get this warning that it blocked running 'scripts or ActiveX controls'. I don't want to change any of my security setting so what should I do here?

    ITKE827,900 pointsBadges:
  • MS SQL Server 2016 backup encryption

    SQL Server 2016 uses AES-256 symmetric encryption algorithm for backups. However, it uses an asymmetric key in conjunction with AES-256. As we know, asymmetric keys are not designed for large data encryption. Does the system, under the hood, generates a sort of symmetric session key and encrypts...

    radudba20165 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

Thanks! We'll email you when relevant content is added and updated.

Following