• How should I store my static data in an iOS app?

    I have a huge amount of data located in my application that I need to access, but never be changed. I'm using it in other applications, such as JSON files and SQL databases, but neither one seems straightforward in iOS. I'm trying to stay from Core Data so should I start storing my data in...

    ITKE351,965 pointsBadges:
  • Can data using a loopback be packet sniffed?

    Does anyone if data that's exchanged on a local machine using a loopback IP 127.0.0.1 be packet sniffed if the PC is connected to a network? I'm trying to figure out the loopback is secure enough for exchanging data. We're using these different platforms: Windows Vista, Windows 7, Mac OS X and...

    ITKE351,965 pointsBadges:
  • What is a File copy limit in Windows XP?

    Does any one know what is a copy limit in windows XP as when we copy a lot of small files Windows XP stations come up with low resources error ex. we copy 40GB=800000 files windows 2003 server edition is fine no problems.

    Dimchik0 pointsBadges:
  • Can’t receive email in Outlook

    I continually get a pop up asking for my username & password for the email address I use in Outlook. The username & password are already in their prospective fields but password is apparently incorrect. Can send but not receive

    austin455 pointsBadges:
  • Outlook Calendar Access/Sharing

    My boss and I use Microsoft Office Outlook. My boss currently only uses the shared calendar. He puts all his appointments and such here as well as group things. He doesnot want to use two different ones, but I want him to be able to give himself reminders and eventually be able to link it to his...

    Adventuredev55 pointsBadges:
  • Is IP Address filtering really secure?

    We're planning to deploy an internal application with a ton of sensitive data and we're becoming very worried security wise. I suggested to keep it on our internal network but I was vetoed. Inside of the app, we programmed it to only respect requests if they come from an internal IP address...

    ITKE351,965 pointsBadges:
  • Does Veritas NETbackup 6.5 encrypt data in backup tape?

    Dear All, During a risk assessment exercise, I realized that my backup admin does not encrypt data in backup tapes. He argues, it is not required as an adversary cannot recover/read data from the backup tape, assuming its stolen, if he does not have the corresponding catalog. He further adds that...

    Novice1235 pointsBadges:
  • How to become a Information security consultant / auditor

    Hi all, I am pretty new to all of this so excuse my ignorance, I have been told by an Information Security Officer That I would be a good consultant, however I am too am confused about how to start or where to start. I know that there are three courses to be a lead auditor but I dont have any...

    JohnStewart25 pointsBadges:
  • Retrieving original MAC address

    Our group is tasked with with retrieving the active MAC address for our Windows PCs. Here's the code we're using: private static string macId() { return identifier("Win32_NetworkAdapterConfiguration", "MACAddress", "IPEnabled"); } private static string identifier(string wmiClass, string...

    ITKE351,965 pointsBadges:
  • Information engineering and cybersecurity

    Is computer and information engineering a part of cybersecurity? If yes tell me why and in which subject please?

    meshaa40 pointsBadges:
  • Certificate enrollment failed – says RPC server unavailable

    I checked my logs in windows 2003 R2 and received the following error: certificate enrollment for local system failed to enroll for one Domain Controller certificate from (SERVER NAME). (RPC server unavailable 0×800706ba (win32: 1722))

    Tis10 pointsBadges:
  • How can I disable Bitdefender Safepay?

    Can I disable Safepay and just keep the Bitdefender Internet Security?

    garig15 pointsBadges:
  • Windows server 2008 disk space problem

    Hi. I have installed Windows 2008 server, and on this platform Forefront firewall. I have a problem: Disk C volume is 30 GB. When I looked up the properties of Disk C, there is 22 GB used space but when I looked up total folders volume on Disk C, all of the volume is 11 GB (Include hidden folders)....

    Eliyevelxan1,235 pointsBadges:
  • What’s the difference between cloud security solutions for ISPs clients and known security program for PC

    What is the difference in performance bet' cloud security solutions for ISP's clients and security program for PCs (like Norton security program for instance)?

    a1b1c1d1e525 pointsBadges:
  • What is the best way to store usernames and passwords within Android applications?

    Should I approach this through this through the preferences screen or code a dialog box into which users can input their details? Either way, how should I arrange security for the app?

    ITKE351,965 pointsBadges:
  • Ghost imagaing

    Hiya all, Specs first.. Ghost Corporate multicast server 7.5. Switches are all 3com, 10/100. Wireless network is 10mg network ports (2) shared via 2 wirelss access points, (D-Link 22Mbps) Problem is, whenever i image multiple machines, the whole network goes slow. The machines affected are old and...

    Carl0s810 pointsBadges:
  • How can a general user trace the origin of TCP/IP data generated by persistent e-mail anomaly?

    Thank you very much for taking time to consider this question. What do you recommend for a general user who needs to trace the origin and route of TCP/IP data associated with an e-mail message? My SOHO computer is infected by some form of malware. The ISP's tech support could not resolve it; the...

    Troubleshoot201415 pointsBadges:
  • Removing SATA HDD passwords

    Hi, Is there a program that can be used to recover or remove SATA HDD passwords?

    Xxx385 pointsBadges:
  • Help! Hackers keep getting in my computer

    I have been hacked for months and I dont know what to do to keep them out. I am not a expert on the computer but I get what I need done, but I was totally unaware that what has happened to me is possible. I got Kevin's book "Hacking for Dummies" to try & learn some of the things I see.  I am...

    Stevie9265 pointsBadges:
  • What should I do to stop people from hacking or tampering my computer?

    I did a chat in a website with a person. Just after few days after, my computer started showing error certificates. (We had Kaspersky internet security set up in it). After that, my CMOS battery failed. I couldn't use Mozilla Firefox and a lots more has changed. Now what should I do to stop this...

    Kittu15Tamilnadu25 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following