• Can biometrics be used for fraud prevention?

    Can biometric identifiers be used for fraud prevention in a developing nation?

    doxy1115 pointsBadges:
  • Finding Gmail ID and password

    I was given a Gmail ID and password from Verizon Wireless. I don't know either one of them. Can you help me either figure it out or get a new one? I have an iPhone and I can't go to iTunes without it. I am giving you my mother's email address below so you can respond with the answer.  Thanks.

    dkmurphy5 pointsBadges:
  • What’s the size of the security awareness training market?

    Hi Folks, Whilst reading the article on using the SANS Secure the human for security education and awareness programs, it prompted me to consider what is the size of this market in terms of $ value?

    IRISHCISO5 pointsBadges:
  • Hacking with key logging

    I am an non IT-mother looking at putting key log software on his laptop. It's remote so I can't physically access it. Is it safe and untraceable? I worry about him. What would you recommend for a program. Will it be visible to him!

    Corina195 pointsBadges:
  • Any place to report Hacker’s ISP?

    Google notified me today that someone in the UK attempted to get into my Gmail, from 86.157.19.222.  I ran a tracert on this address, and it goes back to btcentralplus.com - which has a rather seedy sounding reputation going back many years. BT  is supposed to be an ISP, but the complaints about...

    AndreaF8,120 pointsBadges:
  • Cannot log into tablet

    My daughter cannot remember the dots to join for the security to get into the tablet. How can I access it?

    philipstuart15 pointsBadges:
  • What is checkpoint security all about?

    Can someone explain to me what checkpoint security is all about?

    Okay645 pointsBadges:
  • Password and email name remains after removal

    My email name and password returns after I have signed out. I do it several times but it remains even when I return. Why is this happening? This happens to several students also.

    aimulibrary5 pointsBadges:
  • Creating HTTP authentication on a Lotus Domino server

    I've been trying to an Android application that would be capable of reading different amounts of data from a Lotus Notes database. I've already started to create the a page to test the HTTP authentication and have run into some problems. Here's my code: public void GoAuth(View v){ final String...

    ITKE352,395 pointsBadges:
  • How to retrieve a password

    How do I retrieve my MSN password?

    himmelblau4120 pointsBadges:
  • Physical Security

    Is it advisable to have one key open all doors in IT that does not contain servers?

    WJacobs25 pointsBadges:
  • Can I enable pinging on Windows Server firewall?

    I've recently installed Windows Server 2008 on one of my servers as I'm able to to connect through Remote Desktop but I'm having trouble pinging. Would I have to open a special port on my firewall to be able to ping my server?

    ITKE352,395 pointsBadges:
  • Changing password on my account

    How can I change the password on my account?

    purpleflower5 pointsBadges:
  • Script failing in Firefox

    I have a slideshow script that works fine in IE and Chrome, but is failing in Firefox. Note that it works fine in Firefox when viewed on my local machine, but is failing when viewed from the server. The site is www.marsandvenusthedogsgreetingcards.com. Please help me figure out why it is failing...

    sroonet10 pointsBadges:
  • HIPAA Compliant Server in Amazon EC2

    Hi, I have an instance in Amazon EC2 and need to be HIPAA compliant. I have two doubts, 1. Should I need to do a block level encryption of the database storage. 2. Should I need to encrypt sensitive data before storing in the database. 3. Best database software to handle with the encryption Any...

    Rinshad5 pointsBadges:
  • How to extract the complete ACL in a Lotus Notes document

    My partner and I are looking for a way to save a complete user list access privileges for a specific Lotus Notes document. We already know that we can get the database-level ACL's from catalog.nsf but not the document-level. How can we attain the complete ACL of every user in a document? Any help...

    ITKE352,395 pointsBadges:
  • Can’t log in to my computer

    On 1 computer only users cannot log in. Username is typed and password gets typed (it doesn't show anything being typed for password) however once enter is pressed, nothing happens. Several users have tried on the one PC as all other PCs work  Can I delete app data for it?  I don't know how.

    AaronBreville5 pointsBadges:
  • Call centers and ISO 9000 certification

    Are there case studies available about the benefit of ISO 9000 certification in call centers?

    skraybill5 pointsBadges:
  • Spying on a mobile phone

    Is there any way to spy on a phone other than installing a spy software on the mobile phone? And if not is there a possibility that this could happen? Please reply.

    moustapha725 pointsBadges:
  • Applying encryption to mobile devices

    How feasible is it to apply encryption to organizational data on mobile devices such as email and other organizational applications? We have a BYOD policy, the question is are we facing any law issues regarding this need mainly in the US and Germany. Thanks.

    OfirNissim5 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following