• Email security on registration form: Is it safe?

    A member of our team has been making updates to one of our sites and he implemented a feature (on the registration form) that checks if an email address is still available for use. But he's nervous if it's secure to show a user if an email address is already taken.Could it be a security risk for...

    ITKE346,450 pointsBadges:
  • Proxy Server

    I'm using a Lenovo computer. This computer has a WiFi Network but it's not connected to the proxy server. The problem is happening anytime I open any web page.

    rameshselvaraj50 pointsBadges:
  • Do spaces in paraphrashes add more security?

    When using paraphrases I often see extra spaces added to the sentences. Does this provide more security than a single line of attached character text?

    ITKE346,450 pointsBadges:
  • My program is being blocked by my antivirus software (AVG)

    I recently created a program that I've been working on that downloads files. It's been working fine until a user is using AVG. It seems that in order to fix the issue, AVG's "Email Protection" must be disabled. I've already tried adding either my program or the JRE to an exceptions list. It doesn't...

    ITKE346,450 pointsBadges:
  • Skipped Items

    Why when I run a full scan, there is a large number of, "skipped items"? Does this mean that these items are not being evaluated for possible viruses?

    jackkrol5 pointsBadges:
  • How do I make sure someone isn’t stealing my password?

    I travel a lot for my company and have been doing some work in third-world countries lately. I've been using the Internet at different Internet cafes and I'm worried about if anyone could have stolen my password or listen to my keystrokes. I've heard one way to get around that would be to write...

    ITKE346,450 pointsBadges:
  • Trying to figure out if my email will be routed securely

    I'm trying to connect to my email server via SSL (SMTP/SSL) and I know the recipient also only checks his email via SSL (web/https or IMAP/SSL). Does anyone know if this increases the security for the message content in any way? What I mean is will the communication between my providers email...

    ITKE346,450 pointsBadges:
  • Why does my organization make us change our password every 90 days?

    The company I work for makes us change my password every 90 days. I know this is commonplace for many organizations but I'm trying to find out if there is a specific vulnerability that it's designed to counter. Or is it just good practice to be done?I know it's a general security question but it's...

    ITKE346,450 pointsBadges:
  • Password error

    please help me solve my wifes answering book turbo pascal. I'm not expert to this field but I'm trying to study it myself. i cant solve this one. here it is: Write a program that have a password, and if the password enter 3 times is failed, it will appear 'error'. I would greatly appreciate those...

    haroldbolambao5 pointsBadges:
  • Edge Router Firewall Question

    Is there a reason why I should run VPNs and Reflexive ACLs on a firewall with NAT + routing functions on the router, if the router alone can take care of it?

    ITKE346,450 pointsBadges:
  • Protecting PDF Files

    I got some documents printed the other day at a local print shop. I noticed that they moved my PDF from my flash drive to their desktop. Is there a way to protect my files without using a password? Is there a way to make a file open once and after that encrypt it?

    ITKE346,450 pointsBadges:
  • Is there a way to detect antivirus program using C#?

    I might have a virus problem with one of my machines so I'm trying to figure out if there's a way to detect an antivirus software inside of it using C#. I understand that the Security Center detects software but is there a way using C#? Thanks for all the help!

    ITKE346,450 pointsBadges:
  • My software is being detected as a virus

    I've recently created a program but after a few hundred downloads, my Nod32 antivirus is detecting it as a Win32/Agent.NFIWJLP trojan. Can someone help me before my program doesn't get deleted by the antivirus software? My program mimics the user's interactions with the PC at a scheduled time....

    ITKE346,450 pointsBadges:
  • Why is this suspicious VMware connection bypassing my firewall?

    I'm currently using VMware 5 and I've noticed recently 2 connections are appearing when I start it up. TCP 10.100.100.161:55555->as-40816.engx.vmware.com:https (ESTABLISHED) TCP 10.100.100.161:55556->a184-85-99-51.deploy.static.akamaitechnologies.com:https (ESTABLISHED) But the problem is...

    ITKE346,450 pointsBadges:
  • Are older viruses removed from virus definition files?

    I already know that anti-virus software receives updates from virus definition files (which contains patterns used to identify viruses). But with the size of updates growing frequently each time, I'm wondering in order to limit the size of the updates, do AV companies remove older viruses from...

    ITKE346,450 pointsBadges:
  • Why do we trust email for password resets?

    Since email is considered insecure why do we trust it for password resets?

    ITKE346,450 pointsBadges:
  • Password encryption: WEP, WPA and WPA2

    I'm pretty much a beginner when it comes to security but I do know that there are pretty much three different methods when it comes to Wi-Fi security: WEP, WPA and WPA2. My question is this: Does one method have better "strength" when it comes password encryption? Or are they pretty much all the...

    ITKE346,450 pointsBadges:
  • Error message ‘Program is trying to send an email on your behalf’

    I am using MYOB to email payslips and get the message "a program is trying to send an email message..." how do i set outlook to do this automatically so i dont have to hit 'allow' for each email

    Natmaher5 pointsBadges:
  • Is a local firewall actually necessary?

    I'm not a security expert but is having local firewalls (enabled on different machines) necessary if you're already running hardware firewalls, like Netgear, that controls in/outbound connections?Does it just added another layer of protection? Thanks!

    ITKE346,450 pointsBadges:
  • How do I find out what type of encryption is being used?

    I am testing a web application which stores the password in the database in an encrypted format. How do I determine what hashing or encryption is being used?

    ITKE346,450 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following