• Windows server 2008 disk space problem

    Hi. I have installed Windows 2008 server, and on this platform Forefront firewall. I have a problem: Disk C volume is 30 GB. When I looked up the properties of Disk C, there is 22 GB used space but when I looked up total folders volume on Disk C, all of the volume is 11 GB (Include hidden folders)....

    Eliyevelxan1,235 pointsBadges:
  • What’s the difference between cloud security solutions for ISPs clients and known security program for PC

    What is the difference in performance bet' cloud security solutions for ISP's clients and security program for PCs (like Norton security program for instance)?

    a1b1c1d1e525 pointsBadges:
  • What is the best security framework?

    I am currently a student at UAT and we were directed to this forum with the instructions to post a question about Security Frameworks, so the best question I can have is, What Security Frameworks have any of you personally worked with and which do you feel is better?

    ChadDiehl5 pointsBadges:
  • What is the best way to store usernames and passwords within Android applications?

    Should I approach this through this through the preferences screen or code a dialog box into which users can input their details? Either way, how should I arrange security for the app?

    ITKE56,495 pointsBadges:
  • Ghost imagaing

    Hiya all, Specs first.. Ghost Corporate multicast server 7.5. Switches are all 3com, 10/100. Wireless network is 10mg network ports (2) shared via 2 wirelss access points, (D-Link 22Mbps) Problem is, whenever i image multiple machines, the whole network goes slow. The machines affected are old and...

    Carl0s810 pointsBadges:
  • Non Routable Networks

    Hi, Please i need someone to tell me what are Non Routable Networks and what are examples? Are there any security risks involved in having them? How Can we mitigate those risks and if there are tools we can use, what are the examples? Thankyou so much.

    345E15 pointsBadges:
  • How can a general user trace the origin of TCP/IP data generated by persistent e-mail anomaly?

    Thank you very much for taking time to consider this question. What do you recommend for a general user who needs to trace the origin and route of TCP/IP data associated with an e-mail message? My SOHO computer is infected by some form of malware. The ISP's tech support could not resolve it; the...

    Troubleshoot201415 pointsBadges:
  • Removing SATA HDD passwords

    Hi, Is there a program that can be used to recover or remove SATA HDD passwords?

    Xxx385 pointsBadges:
  • Help! Hackers keep getting in my computer

    I have been hacked for months and I dont know what to do to keep them out. I am not a expert on the computer but I get what I need done, but I was totally unaware that what has happened to me is possible. I got Kevin's book "Hacking for Dummies" to try & learn some of the things I see.  I am...

    Stevie9265 pointsBadges:
  • What should I do to stop people from hacking or tampering my computer?

    I did a chat in a website with a person. Just after few days after, my computer started showing error certificates. (We had Kaspersky internet security set up in it). After that, my CMOS battery failed. I couldn't use Mozilla Firefox and a lots more has changed. Now what should I do to stop this...

    Kittu15Tamilnadu25 pointsBadges:
  • How do I get started in cyber security?

    I want to know the best way to begin learning about cyber security: Should I start with college? Is information technology the best major to pursue or should I pursue computer science? I've read that a bachelor's or degree isn't necessary for cyber security careers and if this is true, what is the...

    rockodubbz5 pointsBadges:
  • Who is legally liable for information on employee devices?

    If illegal software and images are on a BYOD who is liable. I have been involved in some cases and this involves my background working with police and computer forensics investigations. It is very clear to me that company directors and IT Management and directors have got this very wrong. Look...

    hrmp7775 pointsBadges:
  • What is Port 443? Why do SSL VPNs make use of it?

    I am setting up a Web SSL VPN for remote access across my WAN. Can someone explain why SSL VPNs use Port 443? Can I use any other port?

    SearchEnterpriseWAN505 pointsBadges:
  • Bypassing FortiGuard web filter

    I want to know if can we bypass our fortiguard web filter. By any means, I have tried all the different VPN software and proxy sites but it's still not working. Torrent is also blocked. Is there any way to by pass it? Please help.

    faisalahd5 pointsBadges:
  • Career Advice required for a career in Computer Networking / Security

    Dear Sir.I am from a Computer Engineer graduated from Sir Syed University in 2001 then I work for Faysal bank i for 2 years in IT Operations and General Banking.Then i thought to change my line and start ACCA(Association of Certified Chartere Accountants) and join Price WaterHouse Coopers as Audit...

    najamzia5 pointsBadges:
  • Open IT Forum: What do you want to see from IT Knowledge Exchange in 2012?

    We asked what your goals are for late 2011 and early 2012, but now we want to know what you hope to see from the IT Knowledge Exchange community. If there's a functionality you would like to see, or a topic you want to know more about, let us know in the discussion section! Don't be afraid to get...

    MelanieYarbrough6,345 pointsBadges:
  • Cloud security against DOS and DDOS

    Which Intrusion Detection Systems are currently used in cloud environment to mitigate DOS and DDOS attacks?

    Asooom5 pointsBadges:
  • How to troubleshoot firewall installation

    How can I troubleshoot my Firewall installation?

    reddel5 pointsBadges:
  • What is an Access Password?

    I have never been asked for an Access Password. Now my login screen asks for this and we have no idea why, or what the password is. Where do I turn from here?

    kriwil5 pointsBadges:
  • Remote Networks Routing not working

    danyortiz20 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following