• Are older viruses removed from virus definition files?

    I already know that anti-virus software receives updates from virus definition files (which contains patterns used to identify viruses). But with the size of updates growing frequently each time, I'm wondering in order to limit the size of the updates, do AV companies remove older viruses from...

    ITKE345,330 pointsBadges:
  • Why do we trust email for password resets?

    Since email is considered insecure why do we trust it for password resets?

    ITKE345,330 pointsBadges:
  • Password encryption: WEP, WPA and WPA2

    I'm pretty much a beginner when it comes to security but I do know that there are pretty much three different methods when it comes to Wi-Fi security: WEP, WPA and WPA2. My question is this: Does one method have better "strength" when it comes password encryption? Or are they pretty much all the...

    ITKE345,330 pointsBadges:
  • Error message ‘Program is trying to send an email on your behalf’

    I am using MYOB to email payslips and get the message "a program is trying to send an email message..." how do i set outlook to do this automatically so i dont have to hit 'allow' for each email

    Natmaher5 pointsBadges:
  • Is a local firewall actually necessary?

    I'm not a security expert but is having local firewalls (enabled on different machines) necessary if you're already running hardware firewalls, like Netgear, that controls in/outbound connections?Does it just added another layer of protection? Thanks!

    ITKE345,330 pointsBadges:
  • How do I find out what type of encryption is being used?

    I am testing a web application which stores the password in the database in an encrypted format. How do I determine what hashing or encryption is being used?

    ITKE345,330 pointsBadges:
  • Can TLS prevent my ISP and others from spying on me?

    Is it possible to use TLS exclusively to secure my email, http servers and desktop client, for everything including email, in/out:80 and web surfing/entertainment browsing? My goal is to prevent my ISP and others from spying on my activity.

    ITKE345,330 pointsBadges:
  • Egress Filtering

    What are the pros and the cons of egress filtering when referring to the network of a medium-sized software business? From what I understand the use of egress filtering will cause issues for some users as it requires policy changes for all new software. But does that annoyance outweigh the...

    ITKE345,330 pointsBadges:
  • Security differences: Proxy vs. Firewall

    I've been doing some security research for one of my coworkers and I figured out that putting a 'proxy' refers to that "man in the middle" by allowing/denying access to certain resources.In terms of security, does proxy add added security (compared to a firewall)?

    ITKE345,330 pointsBadges:
  • Do Windows antivirus tools use API Hooking to protect files?

    From what I understand, antiviruses hook to a file, accesses it and scan the files, and if necessary, make the file inaccessible to protect the system. Is this done via API hooking or some other methodology?

    ITKE345,330 pointsBadges:
  • What is the best way to protect a 4 digit password?

    I've read that hackers can hit all 10,000 possible variations of a 4-digit pin code within 5 minutes. Is this true? If so, what is the best way to secure the password - hashing, salting, bcrypt, or something else?

    ITKE345,330 pointsBadges:
  • Security Audit

    what form or procedeure would you use for a final security Audit after the Avaya system is installed?

    HubeHube20 pointsBadges:
  • Security Certifications

    What are credible entry level security certifications? There are so many and Im confused. I am Comptia A+, network+ and MCTS server 2008 certified along with a CIS bachelors

    Flkid5 pointsBadges:
  • Would versioning a file make it less secure?

    I'm using KeePassX as a password manager, and I've stored a KDB file in a Sparkleshare folder to back it up / sync with other devices.But just as a question (with the file being encrypted) if someone stole the file, they would several different versions of the file with minor variations. Would that...

    ITKE345,330 pointsBadges:
  • Our team is looking to a tool to scan a PDF file for malware

    Our development team is looking for a tool that can scan a PDF file to determine if it might contain malware or a virus. Alternatively, the tool assigns a risk level to PDF.A web-based solution could work if it's scriptable. Does anyone have any suggestions?

    ITKE345,330 pointsBadges:
  • CSG and wildcard certificates

    Is it possible to use Wildcard certificates with Citrix Secure Gateway. There is already one on the server but when selecting it for use with the Citrix Secure Gateway, the site claims there is an invalid certificate installed and that it does not match the FQDN.

    Ironballz70 pointsBadges:
  • Security conference speakers

    I just wrote a story on one of the RSA 2005 keynotes. Anyone like to share their opinion on this topic? Frank Abagnale: Catch him if you can http://searchsecurity.techtarget.com/originalContent/0,289142,sid14_gci1035900,00.html The former ID thief made famous in a Leonardo DiCaprio movie wants to...

    ShawnaMcAlearney0 pointsBadges:
  • Under-the-radar enterprise security threats

    Which enterprise security threat do you think has gone under the radar? As an editor on SearchSecurity.com, I'm interested to hear what you think. Our favorite response will win some great, free security training books. http://searchsecurity.techtarget.com/generic/0,295582,sid14_gci1368789,00.html

    WHurley5 pointsBadges:
  • Your mobile device security policy

    From a security perspective, how are you dealing with employees that want to bring in their own personal devices? http://searchmidmarketsecurity.techtarget.com/news/article/0,289142,sid198_gci1510987,00.html

    SearchMidmarketSecurityATE150 pointsBadges:
  • Is password hashing really important? Why?

    I've been studying up on my security expertise and I came across an article that talked about the benefits of hashing a password (as a second layer of defense). This is the trouble I'm having with it:Would password hashing only be important if the system is not strong enough to give an intruder...

    ITKE345,330 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following