• RSA and DSA keys: Which one should I choose?

    I've been generating SSH Authentication keys on a Linux/Unix using ssh-keygen. After doing that, I've been given the choice of either creating a RSA or DSA key pair (using -t type).This has me curious: What are the big differences between RSA and DSA keys? Why should I choose one over the other?

    ITKE342,865 pointsBadges:
  • S/MIME and PGP: How do they differ?

    This is more of a general question but is S/MIME an abstracted system for MIME type encryption (Just as PGP is used more for email)? Why should I choose one over the other? Is it possible both could be used at the same time?

    ITKE342,865 pointsBadges:
  • ICT tool

    Which ICT tool can solve networking with security and to address lack of access and parity?

    Jewel285 pointsBadges:
  • Can’t enter ROMmon mode in Cisco router 2811

    hi i have cisco 2811 router and when i try to enter in rommon mon not possiable i try all but useless on console mod just garabge plese help

    Alca5 pointsBadges:
  • Launching Smart Clients on Citrix

    We use Citrix to allow our remote users to launch smart client apps on their machines. Unfortunately our users have to download smart client apps every time they log on via remote Citrix server because their user profiles are purged each time they close their session. Is there a way to maintain the...

    ITKE342,865 pointsBadges:
  • USB port security

    I have a user that needs their USB port to be able to save data in their USB drive. For security purposes the USB drive is not able to save data into any USB drive but they are able to view data on a USB port. That was approved by corp and I need to know how to do this. How do I enable the "save...

    ITgeeks35 pointsBadges:
  • Regarding SFTP

    I am not a AS/400 programmer but overheard my colleagues and suggested them to use SSH. Greatly appreciated if anyone can suggest here... They have a batch job which creates a text file containing the sftp command passing IP address, username, password and the file to be transferred. I suggested...

    bijunator5 pointsBadges:
  • IT

    If company A attacks company B, how should the company A address the issue? What is the possible solution?

    RANARANA5 pointsBadges:
  • What are the costs involved in having a product certified

    I have a product that I want to get listed on the certified product list. How can I do that?

    dzerna5 pointsBadges:
  • Is it possible to stack a Catalyst WS-C3750X-24T-L with a WS-C3750X-12S?

    Is it possible to stack a Catalyst WS-C3750X-24T-L with a WS-C3750X-12S?

    Lilirouter135 pointsBadges:
  • Bonded ADSL Routers Cisco 1921

    Hi, everyone, My ISP (Enta) have started to do Bonded ADSL. The hardware they recommend is a Cisco 1921 - I'd also need a couple of ADSL Modules - this brings the price to over £1000 - bit too much for a broadband router. However, I'm told that I can connect multiple Netgear DG834's as they have a...

    flowerlee85 pointsBadges:
  • Key Loggers and Root kits

    Hi All, It seems my company is affected by key loggers and root kits and malware. Would you people suggest if this can be cleaned and controlled at perimeter level with help of ASA firewalls, IPS things of that sort? Can we tight the security for these kind of issues with ASA firewall at perimeter...

    raviv073110 pointsBadges:
  • Will litigation against Huawei affect me as a buyer?

    I have been working on assessing a few leading network equipment vendors in the likes of Cisco, HP, Juniper, etc., to procure Layer 2 switches. I am currently assessing the capabilities of Huawei and i have been hearing about a litigation raised by Nortel (Avaya) against Huawei on their Layer 2...

    Unified Communications ATE2,130 pointsBadges:
  • Router Cisco 2800

    How to restore iOS Cisco router 2800 card reader?

    abdoukh5 pointsBadges:
  • Preventing command prompt access except by domain admin

    Can we prevent command prompt access on all servers except for when run by a domain administrator?

    NewnanIT1,110 pointsBadges:
  • Using the free reverse engineering malware tools in REMnux

    Hi Experts, I have seen Keith Sir's(Keith Barker)Video on REMnux. This seems to be powerful. I have somewhat understood the video. Had little queries. Kindly guide/suggest.I Just wanted to understand if this can be implemented on production as VM and scan through the infected windows...

    raviv073110 pointsBadges:
  • Skinny website

    Website studyspanish.com appears small and skinny on Firefox. How can I fix this?

    WeeLassie15 pointsBadges:
  • Microsoft Virtualization live expert chat: 3/31, 11:00 am EST

    Edwin Yuen, Microsoft Virtualization expert, will be with us March 31st from 11 - 3 EST here on IT Knowledge Exchange to answer your enterprise virtualization questions in a live chat. Join us on the Microsoft Virtualization blog 11:00 am EST on March 31st to ask Edwin your toughest enterprise...

    JennyMack4,280 pointsBadges:
  • Screen saver

    How do I set up a security question for my screen saver?

    katydid405 pointsBadges:
  • Working on getting into the field…

    Hello anyone and everyone! My name is Marty and I am working on getting into the Information Security field so I have a lot of questions. For now though, I will post just this one to start. I am 45 and a Disabled Veteran starting late, obviously, getting into the field, so what are the most...

    MockLife5 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following