• Is Firefox a secure place to store a Master Password?

    I have a master password set up on Firefox that is 30 characters long. I'm afraid this is not a very secure set-up. Can someone alleviate my fears or let me know if I should change this ASAP?

    ITKE347,940 pointsBadges:
  • Is a Firewall impervious to Viruses?

    By being connected to the Internet, a computer can be infected with viruses. Why do we put a firewall between the computer and the internet. Isn't the firewall vulnerable to virus attacks?  If not, why not?

    ITKE347,940 pointsBadges:
  • Passwords stored in Plain Text?

    I joined a forum a while back and hadn't returned for a while. In the meantime, I forgot my password. When I returned and clicked their "Request Help With Password link", they sent me my password in Plain Text via email instead of sending me a unique link to reset my password. I would imagine the...

    ITKE347,940 pointsBadges:
  • Virus scanning app for .Net

    I'm trying to write a web application in C+ for .Net to scan user-uploaded files for viruses. Unfortunately, it seems to be beyond my skill level, specifically drafting an API to perform the check programatically.  I could use some help or a good tutorial.

    ITKE347,940 pointsBadges:
  • AVG is showing an application as a threat

    We have a team working on a project in VB.NET that also includes socket communication and HTTP Listeners. (We have a group of applications that are intercommunicating between Sockets). But a few days ago, we received a message that AVG (anti-virus) was showing one as a threat (executable).How can...

    ITKE347,940 pointsBadges:
  • RSA and DSA keys: Which one should I choose?

    I've been generating SSH Authentication keys on a Linux/Unix using ssh-keygen. After doing that, I've been given the choice of either creating a RSA or DSA key pair (using -t type).This has me curious: What are the big differences between RSA and DSA keys? Why should I choose one over the other?

    ITKE347,940 pointsBadges:
  • S/MIME and PGP: How do they differ?

    This is more of a general question but is S/MIME an abstracted system for MIME type encryption (Just as PGP is used more for email)? Why should I choose one over the other? Is it possible both could be used at the same time?

    ITKE347,940 pointsBadges:
  • ICT tool

    Which ICT tool can solve networking with security and to address lack of access and parity?

    Jewel285 pointsBadges:
  • Launching Smart Clients on Citrix

    We use Citrix to allow our remote users to launch smart client apps on their machines. Unfortunately our users have to download smart client apps every time they log on via remote Citrix server because their user profiles are purged each time they close their session. Is there a way to maintain the...

    ITKE347,940 pointsBadges:
  • USB port security

    I have a user that needs their USB port to be able to save data in their USB drive. For security purposes the USB drive is not able to save data into any USB drive but they are able to view data on a USB port. That was approved by corp and I need to know how to do this. How do I enable the "save...

    ITgeeks35 pointsBadges:
  • Regarding SFTP

    I am not a AS/400 programmer but overheard my colleagues and suggested them to use SSH. Greatly appreciated if anyone can suggest here... They have a batch job which creates a text file containing the sftp command passing IP address, username, password and the file to be transferred. I suggested...

    bijunator5 pointsBadges:
  • IT

    If company A attacks company B, how should the company A address the issue? What is the possible solution?

    RANARANA5 pointsBadges:
  • What are the costs involved in having a product certified

    I have a product that I want to get listed on the certified product list. How can I do that?

    dzerna5 pointsBadges:
  • Key Loggers and Root kits

    Hi All, It seems my company is affected by key loggers and root kits and malware. Would you people suggest if this can be cleaned and controlled at perimeter level with help of ASA firewalls, IPS things of that sort? Can we tight the security for these kind of issues with ASA firewall at perimeter...

    raviv073110 pointsBadges:
  • Will litigation against Huawei affect me as a buyer?

    I have been working on assessing a few leading network equipment vendors in the likes of Cisco, HP, Juniper, etc., to procure Layer 2 switches. I am currently assessing the capabilities of Huawei and i have been hearing about a litigation raised by Nortel (Avaya) against Huawei on their Layer 2...

    Unified Communications ATE2,185 pointsBadges:
  • Preventing command prompt access except by domain admin

    Can we prevent command prompt access on all servers except for when run by a domain administrator?

    NewnanIT1,110 pointsBadges:
  • Using the free reverse engineering malware tools in REMnux

    Hi Experts, I have seen Keith Sir's(Keith Barker)Video on REMnux. This seems to be powerful. I have somewhat understood the video. Had little queries. Kindly guide/suggest.I Just wanted to understand if this can be implemented on production as VM and scan through the infected windows...

    raviv073110 pointsBadges:
  • Microsoft Virtualization live expert chat: 3/31, 11:00 am EST

    Edwin Yuen, Microsoft Virtualization expert, will be with us March 31st from 11 - 3 EST here on IT Knowledge Exchange to answer your enterprise virtualization questions in a live chat. Join us on the Microsoft Virtualization blog 11:00 am EST on March 31st to ask Edwin your toughest enterprise...

    JennyMack4,280 pointsBadges:
  • Screen saver

    How do I set up a security question for my screen saver?

    katydid405 pointsBadges:
  • Working on getting into the field…

    Hello anyone and everyone! My name is Marty and I am working on getting into the Information Security field so I have a lot of questions. For now though, I will post just this one to start. I am 45 and a Disabled Veteran starting late, obviously, getting into the field, so what are the most...

    MockLife5 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following