• Can TLS prevent my ISP and others from spying on me?

    Is it possible to use TLS exclusively to secure my email, http servers and desktop client, for everything including email, in/out:80 and web surfing/entertainment browsing? My goal is to prevent my ISP and others from spying on my activity.

    ITKE346,430 pointsBadges:
  • Egress Filtering

    What are the pros and the cons of egress filtering when referring to the network of a medium-sized software business? From what I understand the use of egress filtering will cause issues for some users as it requires policy changes for all new software. But does that annoyance outweigh the...

    ITKE346,430 pointsBadges:
  • Security differences: Proxy vs. Firewall

    I've been doing some security research for one of my coworkers and I figured out that putting a 'proxy' refers to that "man in the middle" by allowing/denying access to certain resources.In terms of security, does proxy add added security (compared to a firewall)?

    ITKE346,430 pointsBadges:
  • Do Windows antivirus tools use API Hooking to protect files?

    From what I understand, antiviruses hook to a file, accesses it and scan the files, and if necessary, make the file inaccessible to protect the system. Is this done via API hooking or some other methodology?

    ITKE346,430 pointsBadges:
  • What is the best way to protect a 4 digit password?

    I've read that hackers can hit all 10,000 possible variations of a 4-digit pin code within 5 minutes. Is this true? If so, what is the best way to secure the password - hashing, salting, bcrypt, or something else?

    ITKE346,430 pointsBadges:
  • Security Audit

    what form or procedeure would you use for a final security Audit after the Avaya system is installed?

    HubeHube20 pointsBadges:
  • Security Certifications

    What are credible entry level security certifications? There are so many and Im confused. I am Comptia A+, network+ and MCTS server 2008 certified along with a CIS bachelors

    Flkid5 pointsBadges:
  • Would versioning a file make it less secure?

    I'm using KeePassX as a password manager, and I've stored a KDB file in a Sparkleshare folder to back it up / sync with other devices.But just as a question (with the file being encrypted) if someone stole the file, they would several different versions of the file with minor variations. Would that...

    ITKE346,430 pointsBadges:
  • Our team is looking to a tool to scan a PDF file for malware

    Our development team is looking for a tool that can scan a PDF file to determine if it might contain malware or a virus. Alternatively, the tool assigns a risk level to PDF.A web-based solution could work if it's scriptable. Does anyone have any suggestions?

    ITKE346,430 pointsBadges:
  • CSG and wildcard certificates

    Is it possible to use Wildcard certificates with Citrix Secure Gateway. There is already one on the server but when selecting it for use with the Citrix Secure Gateway, the site claims there is an invalid certificate installed and that it does not match the FQDN.

    Ironballz70 pointsBadges:
  • Security conference speakers

    I just wrote a story on one of the RSA 2005 keynotes. Anyone like to share their opinion on this topic? Frank Abagnale: Catch him if you can http://searchsecurity.techtarget.com/originalContent/0,289142,sid14_gci1035900,00.html The former ID thief made famous in a Leonardo DiCaprio movie wants to...

    ShawnaMcAlearney0 pointsBadges:
  • Under-the-radar enterprise security threats

    Which enterprise security threat do you think has gone under the radar? As an editor on SearchSecurity.com, I'm interested to hear what you think. Our favorite response will win some great, free security training books. http://searchsecurity.techtarget.com/generic/0,295582,sid14_gci1368789,00.html

    WHurley5 pointsBadges:
  • Your mobile device security policy

    From a security perspective, how are you dealing with employees that want to bring in their own personal devices? http://searchmidmarketsecurity.techtarget.com/news/article/0,289142,sid198_gci1510987,00.html

    SearchMidmarketSecurityATE150 pointsBadges:
  • Is password hashing really important? Why?

    I've been studying up on my security expertise and I came across an article that talked about the benefits of hashing a password (as a second layer of defense). This is the trouble I'm having with it:Would password hashing only be important if the system is not strong enough to give an intruder...

    ITKE346,430 pointsBadges:
  • Is Firefox a secure place to store a Master Password?

    I have a master password set up on Firefox that is 30 characters long. I'm afraid this is not a very secure set-up. Can someone alleviate my fears or let me know if I should change this ASAP?

    ITKE346,430 pointsBadges:
  • Is a Firewall impervious to Viruses?

    By being connected to the Internet, a computer can be infected with viruses. Why do we put a firewall between the computer and the internet. Isn't the firewall vulnerable to virus attacks?  If not, why not?

    ITKE346,430 pointsBadges:
  • Passwords stored in Plain Text?

    I joined a forum a while back and hadn't returned for a while. In the meantime, I forgot my password. When I returned and clicked their "Request Help With Password link", they sent me my password in Plain Text via email instead of sending me a unique link to reset my password. I would imagine the...

    ITKE346,430 pointsBadges:
  • Virus scanning app for .Net

    I'm trying to write a web application in C+ for .Net to scan user-uploaded files for viruses. Unfortunately, it seems to be beyond my skill level, specifically drafting an API to perform the check programatically.  I could use some help or a good tutorial.

    ITKE346,430 pointsBadges:
  • AVG is showing an application as a threat

    We have a team working on a project in VB.NET that also includes socket communication and HTTP Listeners. (We have a group of applications that are intercommunicating between Sockets). But a few days ago, we received a message that AVG (anti-virus) was showing one as a threat (executable).How can...

    ITKE346,430 pointsBadges:
  • RSA and DSA keys: Which one should I choose?

    I've been generating SSH Authentication keys on a Linux/Unix using ssh-keygen. After doing that, I've been given the choice of either creating a RSA or DSA key pair (using -t type).This has me curious: What are the big differences between RSA and DSA keys? Why should I choose one over the other?

    ITKE346,430 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following