• What should the process be to remove users on leave?

    Typically when a user goes on disability, short term, or parental leave, do you disable their AD? What about their exchange? RSA? Smartphone?Also, is there usually a process to inform them that you are disabling their access?

    sfuboy5 pointsBadges:
  • Microsft Visual Studio performance issues do to antivirus software

    Does anyone know which antivirus program causes the least amount of slowdown while working in Microsoft Visual Studio? Every time my virus checker goes off I run into serious performance issues due to the system check. Does this happen to other people? Do you think the issue is the virus checker or...

    ITKE346,360 pointsBadges:
  • How to become a security expert?

    Hi, How do I become an expert as a security analyst? I graduated from business IT field without security knowledge. What area should I start studying with? Some people suggested me to take CEH first. What do you guys think? Is CEH a good cert to start with?Appreciate any feedback :)

    user7775 pointsBadges:
  • Transmitting encrypted PDFs via email

    Hi! I could use some help. My company plans to send out critical data to our clients in encrypted PDF format. Is there a danger that they could be blocked in the future as virus scanners become more sophisticated and conclude that they could be carrying malware?

    ITKE346,360 pointsBadges:
  • How do you protect a server against Denial of Service attacks?

    How do you protect a server against Denial of Service attacks? What techniques do advanced firewalls use to protect against DoS/DDoS attacks?

    ITKE346,360 pointsBadges:
  • Can I use off-the-record style encryption for my emails?

    I'm new to the security world but I know that instant messaging uses "off-the-record" encryption (which means that a user would get authentication, encryption and forward deniability). But for my email, all we use is GPG/PGP, which offers authentication and encryption but doesn't allow forward...

    ITKE346,360 pointsBadges:
  • Tellabs 532L DACS password

    Does anyone know how to reset Tellabs 532L DACS back to the factory default of TELLABS?

    comstock5 pointsBadges:
  • Is it really necessary to block outgoing ports?

    I've been told that when I'm setting up my home network, I should make sure that all outgoing ports on my router should be blocked, although I should allow certain ones to open to support HTTP, HTTPS, etc. This even though I have a firewall in place. But is this really necessary if every computer...

    ITKE346,360 pointsBadges:
  • Encryption: Using a static IV

    A part of our team has had to extend our website to try to communicate user credentials for a suppliers website. We're using a 256-bit key but they're using a static IV for decrypting the information. We've advised them not to use static because it's an a security risk. But we want to know how big...

    ITKE346,360 pointsBadges:
  • Installing antivirus software on a web server

    Should a web server have antivirus software installed and active at all times? Are there situations where it is not needed? What should be considered when choosing one to install?

    ITKE346,360 pointsBadges:
  • which tools can be used to analyse vulnerabilities?

    tools which are used to analyse vulnerabilities(which can be downloaded for free)

    Creeeper60 pointsBadges:
  • How to find cyphers for HTTPs?

    I'm trying to find some cyphers which are known to be secure for HTTPs. The OpenSSL website has a long list of cyphers that can be used with SSL and TLs, but how to tell which, if any, are still valid and of those which would support HTTPS? Is there a recent paper or similar tool I can use to find...

    ITKE346,360 pointsBadges:
  • How do antiviruses perform their scans so quickly?

    How do antivirus programs investigate hundreds of thousands of files so quickly while maintaining good detection rates? Most are able to do this in real-time while not slowing down computer processing rates by very much. How is this done?

    ITKE346,360 pointsBadges:
  • Worried someone has access to my pc

    programs running on my pc will sometimes just completely shut down for no reason whatsoever

    puzamanzi5 pointsBadges:
  • Why use 256 bit encryption instead of 128 bit?

    Why is that 256 bit encryption has become so popular? Isn't 128 bit security enough for most applications?

    ITKE346,360 pointsBadges:
  • Hashing passwords: Is it a good idea?

    Now, I'm not sure if this is the best idea so that's why I'm trying to start this discussion. For hashing passwords, should we use hashed passwords as the salt?$passwd = 'foo'; $salt = hash($passwd); $finalHash = hash($passwd . $salt);The $finalHash is what would be stored in the database. I do...

    ITKE346,360 pointsBadges:
  • GUIDs: Are they actually safe?

    I'm studying to become a security expert and I've noticed a ton of websites use GUIDs for password resets, unsubscribe requests, etc. I'm assuming most sites use them because they're easy to use and they're unique. But I'm curious to find out how safe GUIDs actually are. Are they actually intended...

    ITKE346,360 pointsBadges:
  • Do any antivirus products use “canary files” to detect rootkits?

    Which antivirus programs use "canary files" with common strings in their filenames to detect:1.) MyRootkit.vir is known to hide files which include the string ".vir" in their filename.2.) Upon installation (or signature update) MyAV puts MyRootkitcanary.vir in C:\Program Files\MyAV\Canary Files\3.)...

    ITKE346,360 pointsBadges:
  • Is it possible to block souce IP’s by their presence in a BotNet?

    A friend of mine in the security industry recently told me that many DOS attacks and general "black hat hacking" attacks usually happen over the TOR network. Would it be possible to dynamically block source IP's by their presence in a BotNet?Would this be effective in blocking DDoS attacks? How...

    ITKE346,360 pointsBadges:
  • Middle ground password security policies

    What password policies are the best without going crazy? We want security but changing passwords 2 times a month is too much. What is a healthy middle ground between security and convenience?

    TeachMeIT975 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following