• Is there a way to detect antivirus program using C#?

    I might have a virus problem with one of my machines so I'm trying to figure out if there's a way to detect an antivirus software inside of it using C#. I understand that the Security Center detects software but is there a way using C#? Thanks for all the help!

    ITKE346,030 pointsBadges:
  • My software is being detected as a virus

    I've recently created a program but after a few hundred downloads, my Nod32 antivirus is detecting it as a Win32/Agent.NFIWJLP trojan. Can someone help me before my program doesn't get deleted by the antivirus software? My program mimics the user's interactions with the PC at a scheduled time....

    ITKE346,030 pointsBadges:
  • Why is this suspicious VMware connection bypassing my firewall?

    I'm currently using VMware 5 and I've noticed recently 2 connections are appearing when I start it up. TCP 10.100.100.161:55555->as-40816.engx.vmware.com:https (ESTABLISHED) TCP 10.100.100.161:55556->a184-85-99-51.deploy.static.akamaitechnologies.com:https (ESTABLISHED) But the problem is...

    ITKE346,030 pointsBadges:
  • Are older viruses removed from virus definition files?

    I already know that anti-virus software receives updates from virus definition files (which contains patterns used to identify viruses). But with the size of updates growing frequently each time, I'm wondering in order to limit the size of the updates, do AV companies remove older viruses from...

    ITKE346,030 pointsBadges:
  • Why do we trust email for password resets?

    Since email is considered insecure why do we trust it for password resets?

    ITKE346,030 pointsBadges:
  • Password encryption: WEP, WPA and WPA2

    I'm pretty much a beginner when it comes to security but I do know that there are pretty much three different methods when it comes to Wi-Fi security: WEP, WPA and WPA2. My question is this: Does one method have better "strength" when it comes password encryption? Or are they pretty much all the...

    ITKE346,030 pointsBadges:
  • Error message ‘Program is trying to send an email on your behalf’

    I am using MYOB to email payslips and get the message "a program is trying to send an email message..." how do i set outlook to do this automatically so i dont have to hit 'allow' for each email

    Natmaher5 pointsBadges:
  • Is a local firewall actually necessary?

    I'm not a security expert but is having local firewalls (enabled on different machines) necessary if you're already running hardware firewalls, like Netgear, that controls in/outbound connections?Does it just added another layer of protection? Thanks!

    ITKE346,030 pointsBadges:
  • How do I find out what type of encryption is being used?

    I am testing a web application which stores the password in the database in an encrypted format. How do I determine what hashing or encryption is being used?

    ITKE346,030 pointsBadges:
  • Can TLS prevent my ISP and others from spying on me?

    Is it possible to use TLS exclusively to secure my email, http servers and desktop client, for everything including email, in/out:80 and web surfing/entertainment browsing? My goal is to prevent my ISP and others from spying on my activity.

    ITKE346,030 pointsBadges:
  • Egress Filtering

    What are the pros and the cons of egress filtering when referring to the network of a medium-sized software business? From what I understand the use of egress filtering will cause issues for some users as it requires policy changes for all new software. But does that annoyance outweigh the...

    ITKE346,030 pointsBadges:
  • Security differences: Proxy vs. Firewall

    I've been doing some security research for one of my coworkers and I figured out that putting a 'proxy' refers to that "man in the middle" by allowing/denying access to certain resources.In terms of security, does proxy add added security (compared to a firewall)?

    ITKE346,030 pointsBadges:
  • Do Windows antivirus tools use API Hooking to protect files?

    From what I understand, antiviruses hook to a file, accesses it and scan the files, and if necessary, make the file inaccessible to protect the system. Is this done via API hooking or some other methodology?

    ITKE346,030 pointsBadges:
  • What is the best way to protect a 4 digit password?

    I've read that hackers can hit all 10,000 possible variations of a 4-digit pin code within 5 minutes. Is this true? If so, what is the best way to secure the password - hashing, salting, bcrypt, or something else?

    ITKE346,030 pointsBadges:
  • Security Audit

    what form or procedeure would you use for a final security Audit after the Avaya system is installed?

    HubeHube20 pointsBadges:
  • Security Certifications

    What are credible entry level security certifications? There are so many and Im confused. I am Comptia A+, network+ and MCTS server 2008 certified along with a CIS bachelors

    Flkid5 pointsBadges:
  • Would versioning a file make it less secure?

    I'm using KeePassX as a password manager, and I've stored a KDB file in a Sparkleshare folder to back it up / sync with other devices.But just as a question (with the file being encrypted) if someone stole the file, they would several different versions of the file with minor variations. Would that...

    ITKE346,030 pointsBadges:
  • Our team is looking to a tool to scan a PDF file for malware

    Our development team is looking for a tool that can scan a PDF file to determine if it might contain malware or a virus. Alternatively, the tool assigns a risk level to PDF.A web-based solution could work if it's scriptable. Does anyone have any suggestions?

    ITKE346,030 pointsBadges:
  • CSG and wildcard certificates

    Is it possible to use Wildcard certificates with Citrix Secure Gateway. There is already one on the server but when selecting it for use with the Citrix Secure Gateway, the site claims there is an invalid certificate installed and that it does not match the FQDN.

    Ironballz70 pointsBadges:
  • Security conference speakers

    I just wrote a story on one of the RSA 2005 keynotes. Anyone like to share their opinion on this topic? Frank Abagnale: Catch him if you can http://searchsecurity.techtarget.com/originalContent/0,289142,sid14_gci1035900,00.html The former ID thief made famous in a Leonardo DiCaprio movie wants to...

    ShawnaMcAlearney0 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following