• Cannot remember admin password on old workstation

    I can't remember my admin password on an old workstation. Is there any backdoor I can use to obtain the password or change it? Can I install another harddrive with an operating system on it and go into the old boot drive and find the password somehow?

    Thebigt15515 pointsBadges:
  • Developing a honeypot system for network administration

    I'm supposed to build a honeypot system for my final year project, since my title is "developing a honeypot system for network administration" I chose the title, becayse its unique, nobody ever has done it in our college yet. But now I'v been reading about it and I'm confused on how to build one....

    Veriya30 pointsBadges:
  • NIC info via script

    Hiya all, I have made a script (Copy and paste from microsoft, then tweak!!!!) to give me certain PC specs, and want to know how to add the NIC information to it, the script gvies me PC name, manufacturer, CPU make, model, speed, RAM, VGA adapter, and i just wanna add the NIC to it. If I can do...

    Carl0s810 pointsBadges:
  • What does RESTful Authentication mean and how does it work? 

    Does anyone know what RESTful authentication means and how it works? I've been searching but can't find much on it. The only understanding that I have is that you pass the session key in the URL. Am I on the right track here? Thanks so much.

    ITKE353,245 pointsBadges:
  • What are the advantages and disadvantages of using key files for web authentication?

    We have a corporate web mail site (that uses PHP and MySQL) for specific users of our company who are working remotely with the web portal. Each user has a password and login. Now, I'm thinking about replacing using text passwords with a key file. Would this type of authentication be more secure...

    ITKE353,245 pointsBadges:
  • What is the most up-to-date replacement for One-Time Passwords?

    I understand that OTP (one-time passwords) are the new generation of password / security techniques but I'm trying to figure out if it's still safe enough or will it vanish soon. If so, what's the new placement for it?

    ITKE353,245 pointsBadges:
  • Memory Stick Virus

    One of my friends' computer has believed to be infected by a virus. Whenever he put memory stick to the computer, following files appeared in the stick: autorun.inf squxe.exe xnvjmz.exe These files can be deleted manually. But when he put that memory stick or other stick, the files appeared again...

    Kwo5 pointsBadges:
  • User profile corrupted when I login to Windows XP

    Every time the user profiles has got corrupted when I login to Windows XP.

    Teamindya5 pointsBadges:
  • My current network challenge

    Hi everyone, The following is my current task. Setup a network with 6 computers Must have file and printer sharing Internet access Things to consider SECURITY - some computers will be laptops (wireless) and some desktop (hardwired) Connectivity - at least one of these computer will be a mac laptop...

    Ithlete5 pointsBadges:
  • Digital signature and entity authentication

    What is used to create a digital signature?

    michaelasmoah10 pointsBadges:
  • Probable Hack on PC

    On several occasions when I am working on my computer I see a line of what looks like Korean text above the line above the navigation bar at the top of the page. I do not see a commonality of when the text line appears. Could you advise me what this means and what I can do?

    ozsum15 pointsBadges:
  • Protecting our internal network

    Hi Network engineers/ managers, I've been faced with a challenge on how to protect our internal network from threats outside with minimal cost, or none at all (at least for the software when using open source) Can anyone advise me what to use? Ive searched about, CISCO ASA, ISA 2003, SNORT,...

    JuneC155 pointsBadges:
  • I forget my password

    How can I reset my password

    loriandskip3215 pointsBadges:
  • Should I use FIDO U2F even if it is not yet the standard?

    I'm working on a security project for my organization and I'm wondering if I should use Fido U2F even if it's not the standard anymore. I would appreciate any advice.

    ITKE353,245 pointsBadges:
  • Using iPad 2 to Remote Desktop

    Has anyone tried getting an iPad 2 to do remote desktop on a Windows XP PC, through a Cisco Pix (ver.6) router? I know Cisco doesn't have an iPad client for the Pix because it's not ASA.

    JZDoug5 pointsBadges:
  • Names of SAS 70 compliant ISPs

    What are the names of SAS 70 Compliant ISPs?

    PeterGDavis5 pointsBadges:
  • VPN creation between ISA Server and Cisco ASA 5510

    Can you create a VPN between a Microsoft ISA Server and a Cisco ASA 5510?

    Bartski5 pointsBadges:
  • Tacacs and authentication on Cisco routers

    We have ACS 3.X server for tacacs + and radius authentication in our LAN switches. Right now I'm able to login through tacacs+ only. I want to enable tacacs+ as well as local telnet login. This will help me to login in switches if the tacacs will fail.

    Ekansh400 pointsBadges:
  • Does multifactor authentication work differently in a cloud-based platform like Windows Azure?

    I'm pretty new to the security field and I was wondering if multi-factor authentication works any differently in a cloud-based platform like Windows Azure? Thanks!

    ITKE353,245 pointsBadges:
  • How does Windows Azure multifactor authentication work?

    Would anyone be able to explain how Windows Azure multifactor authentication work? Thanks in advance.

    ITKE353,245 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following