• Linux security: Partition a box

    I recently purchased a new laptop and I'm thinking of installing Kali Linux it so I can learn more about network security. Can I partition a Linux box so it's resistant to any security risks? Thanks!

    ITKE406,240 pointsBadges:
  • Which choice is better for a certificate to be used metadata’s for SSO? Frequently changing or one that remains same over long duration?

    In our SAML SSO Setup, currently we are using tomcat certificate in Service Provider metadata for signing and encryption purpose, but since many CAs are providing certificate validity to be very less (30-60 days), It is getting painful to redo the cumbersome SSO Setup on our huge server cluster,...

    schhonker5 pointsBadges:
  • Network documentation/Diagram

    I am curious as to how others are documenting their network; both visually and configurations. I am familiar with MS Visio for drawing the network. Are there better options? What about documenting all equiptment? IP addresses? Settings? Changes? I am just using MS Excel/word to create all sorts of...

    Skepticals0 pointsBadges:
  • Network Connection Freezes

    For some reason, at random, among 20 PCs on my network, in the morning or during the day, the network connection stops responding for both intranet and internet communications. The only solution thus far is to remove the NIC from the Device Manager, reboot the PC, and let Windows XP Pro find the...

    DboiSOBE0 pointsBadges:
  • Make an url attack by SQL injection to display all data in the database

    Can you help me to make an URL attack by SQL injection to display all data in the database? For example by login form to display all registered users in the database. Thank you.

    noor199530 pointsBadges:
  • Data Security System

    Can a hotel chain implement a single information security infrastructure for all its hotels?

    yvoncl15 pointsBadges:
  • Compromise in data integrity

    How does a compromise in data confidentiality lead to a compromise in data integrity?

    phineas5 pointsBadges:
  • Forgot my password on Skype

    I forgot my password for Skype. How can I get it back?

    hollywoodjoan5 pointsBadges:
  • Block websites with Windows 8 firewall

    Can I use my Windows 8 firewall to block several websites? Or do I have to a third-party firewall for this?

    ITKE406,240 pointsBadges:
  • Malware scan of internal storage of Android device

    Can I actually scan all of the content on my Android device's internal storage without damaging it? I'm afraid there's a virus and I'm trying to run a malware scan of the entire storage. Thanks!

    ITKE406,240 pointsBadges:
  • Trojan/Spyware on iPhone 5c

    Can a hacker install a Trojan/spyware virus onto an iPhone 5c if you use it as a personal hotspot for a windows computer, if you visit a bad website and your compute gets the virus will my iPhone 5c also get it as it is the personal hotspot? I'm only talking about Trojans and spyware as I have...

    TomW985 pointsBadges:
  • What is Port 443? Why do SSL VPNs make use of it?

    I am setting up a Web SSL VPN for remote access across my WAN. Can someone explain why SSL VPNs use Port 443? Can I use any other port?

    SearchEnterpriseWAN1,350 pointsBadges:
  • Does a client machine have to have an IP address during EAP process?

    Does a client machine must have IP address on it before it is authenticated with 802.1x using EAP protocol?

    sqambera35 pointsBadges:
  • My LG10 micro controlled device

    Is there a scan that will tell me if someone is controlling my phone?

    Karma325 pointsBadges:
  • Authentication token error message on Ubuntu server

    On my Ubuntu server when I login with my username and type in the PASSWD command to change my password, I keep getting this error message: passwd: Authentication token manipulation error passwd: password unchanged Am I missing something here? Is there another way to change my password? Currently,...

    ITKE406,240 pointsBadges:
  • How to setup Gmail encryption

    My friend is an accounting for a finance company and he asked me what's the best way to exchange several documents with his clients. I told him the best way to do it was through PGP but he just wants to send emails through Gmail. If there's a way, can he encrypt his emails through Gmail?

    ITKE406,240 pointsBadges:
  • How can the IP address be protected?

    How can I protect my IP address?

    oritsco5 pointsBadges:
  • Citrix MetaFrame Login – Credential Validation Error

    I am new to Citrix Metaframe. Recently I had a virus attack and My Citrix server crushed. I have re-installed all the necessary services and also installed Citrix Metaframe 4.0. I have published applications on a myfarm and I can open then in Citrix program neighborhood. The problem comes when I...

    Sam19795 pointsBadges:
  • Opening SQL Server ports

    I'm looking to open up my SQL Server port through a Windows firewall but I'm struggling with the process. Is there a way I can find the ports that SQL is running on so I can open them?

    ITKE406,240 pointsBadges:
  • Authentication for Dragon naturally speaking software

    How does a user authenticate themselves to a system?

    TLehmanjn59gmailcom20165 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following