• How to say when attacker IP address coming from which country and which origin?

    If some country citizen has hacked my server using DDoS attack, how can we find the attackers country name or origin?

    sk945235 pointsBadges:
  • Domain security policy and domain controller security policy

    What is the difference between domain security policy and domain controller security policy?

    Sonu1235 pointsBadges:
  • need to change password of router

    my wouter has 6 character password. my iphone doesn't take less than 8 character. I need to change the password of my netgear router

    Michelle085 pointsBadges:
  • How can I secure my LAN?

    Dear Experts, I need to secure the intranet, recently there were many unknown activities from LAN which were attacking my servers, routers and switches. How do I secure the LAN and users in it from the Internet and from each other?

    rahulkl25 pointsBadges:
  • App to monitor network traffic

    Could someone direct me to an app that monitors network usage while excluding local traffic?  It also has to track traffic that comes directly from the Internet or goes directly there.

    ITKE354,245 pointsBadges:
  • Is PGP encryption available for IBM I

    Is PGP command line encryption of files available for IBM I?

    arfarn105 pointsBadges:
  • Are reversibly encrypted passwords safe?

    I've noticed that in my event log, I keep getting this message when my router tries to use Radius for authentication. """The user could not be authenticated using Challenge Handshake Authentication Protocol (CHAP). A reversibly encrypted password does not exist for this user account. To ensure that...

    ITKE354,245 pointsBadges:
  • Forgot my Skype password

    I forgot my Skype password so is there a way to get it back please?

    binodbhusal5 pointsBadges:
  • How does Google Authenticator work?

    I'm pretty new to Google Authenticator but I understand it's an alternative to SMS for 2Step verification. But the part I don't understand is that how is it possible that it works without connectivity? How can the server and mobile phone sync together to know which code is valid? I would appreciate...

    ITKE354,245 pointsBadges:
  • Is WEP shared key authentication secure?

    I'm pretty new to the security field and I've been reading up on wireless authentication / shared key authentication. It doesn't sound very secure to me. Basically, here's what I figured out: The station sends an authentication request to the access point. The access point sends challenge text to...

    ITKE354,245 pointsBadges:
  • What are the hardware requirements for implementing the FIDO U2F standard? Are there any issues with backwards compatibility?

    I'm thinking about revamping my personal OP-SEC in the near future but I need to make sure that the security token I get will be backwards compatible with the FIDO standard. Would anyone happen to know of what's required of hardware to implement FIDO U2F standard and if xNT is future-proof? Why...

    ITKE354,245 pointsBadges:
  • Outlook web access needs to be accesible via the internet with Exchange 2007 and Outlook 2007

    Exchange 2007 running all roles on a single server and client running Outlook 2007. OWA is working fine on the LAN. I need to make OWA available from the Internet. We don't run ISA Server but do have a fully configurable firewall between the LAN and Internet. Any advice on how to set this up?

    ITKE354,245 pointsBadges:
  • What should I do with this Watchguard Firebox 500? I don’t have the system manager for it

    I was given a Watchguard Firebox 500 today. The model number is F2064N. Apperantly, you need the Firebox System Manager application to manage these devices, which is only available if you have the device actiavated on your watchguard account. Unfortunately, I don't have that. Should I destroy it...

    Ingram871,285 pointsBadges:
  • How can I test a web application for memory leakage?

    How can I test a web application for memory leakage?

    Rajeshqa5 pointsBadges:
  • What ports do I need to open on a firewall for Exchange 2007?

    What ports do I need to open on a firewall for Exchange 2007?

    ITKE354,245 pointsBadges:
  • Security firewall in routers

    How do I disable the firewall in the Ericson w35 router because it blocking some of my programs from working properly. It says my NAT port is blocked.

    Jaw645 pointsBadges:
  • lsass CPU after enabling SSL

    lsass.exe utilization is more CPU after enabling SSL?

    Aryavrat15 pointsBadges:
  • Can you provide an example of a one-time password algorithm?

    I'm trying to develop a website, along with a corresponding helper program (that would be installed on a user computer). Both the website and the program will communicate with each other through AJAX but I know it will be a huge security risk other web pages can send requests to the program. I need...

    ITKE354,245 pointsBadges:
  • Is it ok to use a weak password as long as I have two-factor authentication?

    When it comes to passwords, I'm pretty strong. I never reuse passwords across sites and I try to use two-factor authentication when it's available. But I do realize that typing all those passwords is a problem. A good friend of mine asked me why I don't use a weak password when two-factor...

    ITKE354,245 pointsBadges:
  • My key fob system has been working fine. Is there any need to upgrade?

    I've noticed that my key fob system has been acting slowly but is still working pretty good. Should I upgrade or hold off?

    ITKE354,245 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following