• How to offer a high availability database environment

    Can I configure VMware Fault Tolerance, or another VMware technology, to host an active DB2 database at one data center, and host a standby DB2 database at a second data center? Applications would access the primary DB when available, and then access the standby DB if the primary failed. The data...

    JimInTexas5 pointsBadges:
  • Most important software for cybersecurity

    What is the most important software and threads for cybersecurity?

    priyankabaskaran5 pointsBadges:
  • SSL/TLS cipher suites for PCI compliance

    I have a question when it comes to PCI DSS compliance and SSL/TLS cipher suites. What order / priority should I list the ciphers in? I already know which ones I need to use and disable, but my friend said there's a priority list too. This will be for Windows servers. Thank you.

    ITKE364,320 pointsBadges:
  • How to write unique domain authentication identifier

    How do I write udai (unique domain authentication identifier)?

    ramuyadav20 pointsBadges:
  • Security Alerts: What is tsassist.exe and browsefox.exe?

    What is tsassist.exe and browsefox.exe? My security software flags these trying to modify my registry.

    dvaughn15 pointsBadges:
  • How to secure e-commerce website?

    Hi there, I am doing my final year R&D project on how to secure e-commerce website? I am mainly looking to secure owasp top 10 threats. Would you be able to give me any advise about the steps and tools and also guidelines that I should follow to successfully overcome those issues? Kindest...

    anayatullah10 pointsBadges:
  • Would Rails 3.0 be PCI compliant?

    I apologize for the short question but would anyone happen to know if Rails 3.0 would pass a PCI compliance scan? Thanks!

    ITKE364,320 pointsBadges:
  • Hacking for beginner

    Which Macbook is best for hacking?

    HNYBGR78785 pointsBadges:
  • PCI compliance failure: Attempts some buffer overflows

    We were PCI compliant for several months straight and all of a sudden, we got this: Fail Serious Port: 21 Protocol: tcp Summary : attempts some buffer overflows CVSS Base Score : 10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C) CVSS Temporal Score : 8.3 (CVSS2#E:F/RL:OF/RC:C) Public Exploit Available : true...

    ITKE364,320 pointsBadges:
  • What is Log Pos malware?

    What is LogPos malware like date of the malware detected, coding language, command and control channel, infecting mechanism, hiding mechanism, impact till date?

    apalkar905 pointsBadges:
  • Fingerprint recognition in Java

    I want a programing source code for fingerprint recognition time and attendance payroll system in Java language. I also want the source code for capturing a fingerprint image and storing in MS Access in Java language for the same project.

    Anikketthakre5 pointsBadges:
  • Web application firewall for IIS

    Does anyone know what's the best web application firewall (WAF) for IIS? Also, is it useful for blocking attacks against poorly written code? I understand that WAF is required by PCI DSS so our organization needs to get one.

    ITKE364,320 pointsBadges:
  • Does temporary storage of credit card info meet PCI DSS requirements?

    For our department, we need to make sure that our temporary storage of our user's credit card information meets PCI DSS requirements. We have to make sure that deletion is compliant DoD's security standards. We thought about using MySQL but we're not sure about the reliability. What should we do?

    ITKE364,320 pointsBadges:
  • Secure credit card information for PCI compliance

    Does anyone know if there's a company / software that offers to store data (particularly credit card information securely) in exchange for a token? Also, can we view the data by using authentication and providing a token back to them? That should be enough for PCI compliance, right? Thanks!

    ITKE364,320 pointsBadges:
  • How to purge database records for PCI compliance

    I have to store some credit card information. To be compliant with PCI DSS, we need to purge the data from our disks by not just deleting the file but writing over the bytes with a random sequence of data (because that would make it harder to recover the data). We would still like to leverage a...

    ITKE364,320 pointsBadges:
  • PCI compliance: Recommended encryption key management

    This question is in reference to PCI compliance. Does anyone know of any recommended encryption key management software? Would ezNCrypt be good to use? Thanks so much.

    ITKE364,320 pointsBadges:
  • Authenticate database for PCI compliance

    We have a PCI compliant website that connects to a database but doesn't store any users' info. However, it does contain HTML / JavaScript snippets that might get rendered into the payment process. Here's my question: Do we have to authenticate the database to remain PCI compliant? Thanks!

    ITKE364,320 pointsBadges:
  • PCI compliance: Password field is present

    We currently have a huge problem with our PCI compliance. According to them, they want us to add http:// on every single page where a password field is present. Here's what my form in index.php looks like: What should we do here?

    ITKE364,320 pointsBadges:
  • Block someone else while I’m logged in

    While I'm logged in, someone else is logged in too. What should I do to block this?

    ANILRAPS5 pointsBadges:
  • Security in cloud computing

    Even though we have authentication tools for the cloud, why do we have a lack of security in public cloud, private cloud and hybrid cloud?

    saikiranreddy20 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following