• How does Google Authenticator work?

    I'm pretty new to Google Authenticator but I understand it's an alternative to SMS for 2Step verification. But the part I don't understand is that how is it possible that it works without connectivity? How can the server and mobile phone sync together to know which code is valid? I would appreciate...

    ITKE376,450 pointsBadges:
  • Is WEP shared key authentication secure?

    I'm pretty new to the security field and I've been reading up on wireless authentication / shared key authentication. It doesn't sound very secure to me. Basically, here's what I figured out: The station sends an authentication request to the access point. The access point sends challenge text to...

    ITKE376,450 pointsBadges:
  • What are the hardware requirements for implementing the FIDO U2F standard? Are there any issues with backwards compatibility?

    I'm thinking about revamping my personal OP-SEC in the near future but I need to make sure that the security token I get will be backwards compatible with the FIDO standard. Would anyone happen to know of what's required of hardware to implement FIDO U2F standard and if xNT is future-proof? Why...

    ITKE376,450 pointsBadges:
  • Outlook web access needs to be accesible via the internet with Exchange 2007 and Outlook 2007

    Exchange 2007 running all roles on a single server and client running Outlook 2007. OWA is working fine on the LAN. I need to make OWA available from the Internet. We don't run ISA Server but do have a fully configurable firewall between the LAN and Internet. Any advice on how to set this up?

    ITKE376,450 pointsBadges:
  • What should I do with this Watchguard Firebox 500? I don’t have the system manager for it

    I was given a Watchguard Firebox 500 today. The model number is F2064N. Apperantly, you need the Firebox System Manager application to manage these devices, which is only available if you have the device actiavated on your watchguard account. Unfortunately, I don't have that. Should I destroy it...

    Ingram871,285 pointsBadges:
  • How can I test a web application for memory leakage?

    How can I test a web application for memory leakage?

    Rajeshqa5 pointsBadges:
  • What ports do I need to open on a firewall for Exchange 2007?

    What ports do I need to open on a firewall for Exchange 2007?

    ITKE376,450 pointsBadges:
  • Security firewall in routers

    How do I disable the firewall in the Ericson w35 router because it blocking some of my programs from working properly. It says my NAT port is blocked.

    Jaw645 pointsBadges:
  • lsass CPU after enabling SSL

    lsass.exe utilization is more CPU after enabling SSL?

    Aryavrat15 pointsBadges:
  • Can you provide an example of a one-time password algorithm?

    I'm trying to develop a website, along with a corresponding helper program (that would be installed on a user computer). Both the website and the program will communicate with each other through AJAX but I know it will be a huge security risk other web pages can send requests to the program. I need...

    ITKE376,450 pointsBadges:
  • Is it ok to use a weak password as long as I have two-factor authentication?

    When it comes to passwords, I'm pretty strong. I never reuse passwords across sites and I try to use two-factor authentication when it's available. But I do realize that typing all those passwords is a problem. A good friend of mine asked me why I don't use a weak password when two-factor...

    ITKE376,450 pointsBadges:
  • My key fob system has been working fine. Is there any need to upgrade?

    I've noticed that my key fob system has been acting slowly but is still working pretty good. Should I upgrade or hold off?

    ITKE376,450 pointsBadges:
  • Are there any particular multifactor authentication issues to consider in the healthcare industry?

    A friend of mine is getting into the healthcare industry has some concerns, particularly when it comes to security. Are there any particular authentication issues that he needs to know about in the healthcare industry?

    ITKE376,450 pointsBadges:
  • How can I allow end users to transfer security groups in Active Directory?

    In our organization, our users logon to their desktops with Active Directory and access SharePoint using Windows authentication. But many of our users frequently change teams, so their access to their old SharePoint team site should be removed. Our maintenance team is refusing to setup groups for...

    ITKE376,450 pointsBadges:
  • How do I generate a Google application-specific password from a shell script?

    I've recently enabled two-factor authentication on Google, but no my Google export scripts aren't working. My computer is verified and trusted but, for some reason, the scripts are not. Basically, every time the CRON job is run, I keep getting this 'Google verification code' and the script fails....

    ITKE376,450 pointsBadges:
  • Changing default password to expire the password when users log in

    I want to change default password to expire the password when users log in. How do I accomplish this?

    DCORDERO4725 pointsBadges:
  • What’s the best way to generate a cryptographically secure token?

    In order to generate a 32 character token for access to our API, we've been using this: $token = md5(uniqid(mt_rand(), true)); But someone told us that this isn't the best way to secure it and that we should use this instead: openssl_random_pseudo_bytes What's the best way here? Thanks for the help.

    ITKE376,450 pointsBadges:
  • How do I set up a PHP password recovery script with a 24-hour token?

    I'm trying to set up a PHP password recovery script, that would use a token but would expire after 24 hours. I'm having trouble setting it up. All I have right now is SHA1 encrypted user passwords but I really need to append a token to the URL that gets sent to the user when they request a password...

    ITKE376,450 pointsBadges:
  • What is the correct way to log out of an HTTP authentication-protected folder?

    Does anyone know of the right way to log out of HTTP authentication protected folder? I understand there are workarounds but they can be dangerous too. Does anyone have a good solution?

    ITKE376,450 pointsBadges:
  • What are the Identity Access Management options in Windows Azure?

    I currently have a mobile application that's been using AWS's IAM infrastructure that allows me to provide temporary access tokens to anonymous mobile devices. This allows them to run queries against AWS services from a mobile device. Would anyone happen to know if Windows Azure has a drop-in...

    ITKE376,450 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.