• What are the Identity Access Management options in Windows Azure?

    I currently have a mobile application that's been using AWS's IAM infrastructure that allows me to provide temporary access tokens to anonymous mobile devices. This allows them to run queries against AWS services from a mobile device. Would anyone happen to know if Windows Azure has a drop-in...

    ITKE372,075 pointsBadges:
  • How do I create a SAML authentication request using Windows Identity Foundation?

    I'm trying to use an API to create SAML authentication requests and receive/interpret the SAML responses but I'm not sure of the best way to do this. I've figured out how to receive and interpret the responses. Can someone point me in the right direction on using APIs to create SAML requests. Thank...

    ITKE372,075 pointsBadges:
  • Are there any alternatives to multifactor authentication that protect user information as well?

    Does anyone happen to know if there are any alternatives out there to multifactor authentication that will protect user information as well?

    ITKE372,075 pointsBadges:
  • track user of computer online who is using maximum bandwidth in LAN

    Hi All, I am Sandeep and working at one software company as system administrator. Company has 60 users (computers). We have 2 MB land line. It goes through Cisco router and all computer default gateway IP is the router IP. We have a ISA server. Now, I want to online monitor this network that which...

    Kapadane105 pointsBadges:
  • Trying to configure Outlook Web Access on my Exchange 2003 Server which is behind a Cisco PIX firewall.

    I have a question. I am trying to configure OWA on my Exchange 2003 Server which is behind a PIX firewall. I am told the OWA should work by default after I have installed the Exchange server. Mine isn't working. I just don't know if its the firewall or not?

    ITKE372,075 pointsBadges:
  • What is LSARPC?

    We have Windows 2003 Servers as our domain controller. We are facing some problem with CPU utilization. When I captured to traffic using sniffers I figured out a protocol called LSARPC  which is frequently used by clients to communicate with Domain Controllers. I am wondering what is this LSARPC?

    Yasir Irfan6,335 pointsBadges:
  • Why can’t I open this Group Policy object?

    I am unable to open a Group Policy Object. The system cannot find the path specified in Windows Server 2003. I can open about half of the GPOs and edit them, but I can't open the other half. If I rebuild the GPO, it works fine. I have run DCDIAG (Clean), GPOTOOL (Clean), I have checked with ADSI...

    Windows Security ATE160 pointsBadges:
  • Cannot remember admin password on old workstation

    I can't remember my admin password on an old workstation. Is there any backdoor I can use to obtain the password or change it? Can I install another harddrive with an operating system on it and go into the old boot drive and find the password somehow?

    Thebigt15515 pointsBadges:
  • Developing a honeypot system for network administration

    I'm supposed to build a honeypot system for my final year project, since my title is "developing a honeypot system for network administration" I chose the title, becayse its unique, nobody ever has done it in our college yet. But now I'v been reading about it and I'm confused on how to build one....

    Veriya30 pointsBadges:
  • NIC info via script

    Hiya all, I have made a script (Copy and paste from microsoft, then tweak!!!!) to give me certain PC specs, and want to know how to add the NIC information to it, the script gvies me PC name, manufacturer, CPU make, model, speed, RAM, VGA adapter, and i just wanna add the NIC to it. If I can do...

    Carl0s810 pointsBadges:
  • What does RESTful Authentication mean and how does it work? 

    Does anyone know what RESTful authentication means and how it works? I've been searching but can't find much on it. The only understanding that I have is that you pass the session key in the URL. Am I on the right track here? Thanks so much.

    ITKE372,075 pointsBadges:
  • What are the advantages and disadvantages of using key files for web authentication?

    We have a corporate web mail site (that uses PHP and MySQL) for specific users of our company who are working remotely with the web portal. Each user has a password and login. Now, I'm thinking about replacing using text passwords with a key file. Would this type of authentication be more secure...

    ITKE372,075 pointsBadges:
  • What is the most up-to-date replacement for One-Time Passwords?

    I understand that OTP (one-time passwords) are the new generation of password / security techniques but I'm trying to figure out if it's still safe enough or will it vanish soon. If so, what's the new placement for it?

    ITKE372,075 pointsBadges:
  • Memory Stick Virus

    One of my friends' computer has believed to be infected by a virus. Whenever he put memory stick to the computer, following files appeared in the stick: autorun.inf squxe.exe xnvjmz.exe These files can be deleted manually. But when he put that memory stick or other stick, the files appeared again...

    Kwo5 pointsBadges:
  • User profile corrupted when I login to Windows XP

    Every time the user profiles has got corrupted when I login to Windows XP.

    Teamindya5 pointsBadges:
  • My current network challenge

    Hi everyone, The following is my current task. Setup a network with 6 computers Must have file and printer sharing Internet access Things to consider SECURITY - some computers will be laptops (wireless) and some desktop (hardwired) Connectivity - at least one of these computer will be a mac laptop...

    Ithlete5 pointsBadges:
  • Digital signature and entity authentication

    What is used to create a digital signature?

    michaelasmoah10 pointsBadges:
  • Probable Hack on PC

    On several occasions when I am working on my computer I see a line of what looks like Korean text above the line above the navigation bar at the top of the page. I do not see a commonality of when the text line appears. Could you advise me what this means and what I can do?

    ozsum15 pointsBadges:
  • Protecting our internal network

    Hi Network engineers/ managers, I've been faced with a challenge on how to protect our internal network from threats outside with minimal cost, or none at all (at least for the software when using open source) Can anyone advise me what to use? Ive searched about, CISCO ASA, ISA 2003, SNORT,...

    JuneC155 pointsBadges:
  • Should I use FIDO U2F even if it is not yet the standard?

    I'm working on a security project for my organization and I'm wondering if I should use Fido U2F even if it's not the standard anymore. I would appreciate any advice.

    ITKE372,075 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.