• Disconnect an unauthorized wireless device

    When using the Netgear router setup facility, under "wireless devices" I noticed a connected device labelled "Android" and I think someone has gotten past the security and is connected to the router and  network. The guest network is not enabled. The network password is fairly strong and would not...

    Bob3715 pointsBadges:
  • IDS/IPS Where do I find out what I really need

    I have a network which is not external facing, that has been sub-contracted out so that I only interface with trusted networks,so I don't believe that I need to have IDS/IPS above my existing firewalls. Is there any document/policy statement anywhere that defines that?

    colinsids5 pointsBadges:
  • Vulnerabilities increase in security products

    Bad news for security products as a recent survey by iViZ Security Inc., found that overall vulnerabilities in security products released in 2012 rose at a compound growth rate of an overwhelming 37.3% over the past three years. Antivirus products were #1, coming in with 49% of the software...

    Michael Tidmarsh28,445 pointsBadges:
  • What are your top three BYOD concerns?

    In a recent survey by SearchCompliance, 'security' was cited by an overwhelming 96% of respondents as being among the top concerns regarding BYOD/consumerization of IT. Compliance came in as the second-ranked concern in the survey. That got us thinking...what are your top three BYOD concerns?

    Michael Tidmarsh28,445 pointsBadges:
  • Does anyone know how I can get the Security + magazine downloaded?

    When I click on the link where the magazine is suppose to be it takes me to a site index of tons of information. Thanks!

    slick10 pointsBadges:
  • Manipulation Engine Definition

    Hi all! I've read the term "manipulation engine" (related to passwords) in a couple of papers but aside from guessing could not find a proper definition of it (not even in this website !!!). Can anyone please redirect me to / provide a clear definition of this term, related to "Security"? Many...

    DiegoDH275 pointsBadges:
  • How to limit DDoS attacks?

    After the recent Spamhaus distributed denial-of-service attack, many DDoS service providers are concerned that targeted attacks are increasing along with bandwidth sizes. What should we do to minimize the threat of impending attacks?

    Michael Tidmarsh28,445 pointsBadges:
  • How to block pen drive and allow Dongle?

    In domain, how do I block pen drive and allow access to Dongle? How to update GPO regarding above mentioned query?

    123sane15 pointsBadges:
  • Dont want to pay alot for a enterprise backup software

    I have a customer that is on a tight budget and want to backup 20 servers remotley. Symantec and CA are all abou the same price 8-11k. Any enterprise backup software out there that is reliable and is a lower cost?

    Goofeydog20 pointsBadges:
  • Advice

    Please any one assist me. We have a small office and I would like to advice my boss that we should find IT people to come and run computer servicing and maintenance as well anti-virus renew. Since we purchased our PCs, we have never done that. Kindly help me on how I can write a letter. I already...

    Esk145 pointsBadges:
  • biometrics

    What are some of the pros and cons to biometrics

    ma5430 pointsBadges:
  • Need for police officers

    Do you think that the technology will improve to a point where police officers are not needed?

    ma5430 pointsBadges:
  • CCNA Question

    This is confusing to me unless I am not seeing the bigger picture.It says configure the router Ip addresses on the E0 and S0 interfaces so that the E0 receives the 11th usable subnet while the S0 receives the 4th usable subnet from the network 192.168.191.0/28. Both interfaces should receive the...

    sed4521d5 pointsBadges:
  • Securitiy Auditing in AS400

    Dear all ! In our company we are using power 720 server for our application. Some of us in the Admin side we have the access to all the objects and can do any changes. But i as a super admin i just want to record all the activities of another person like changes in PF and job ending and all...

    Sureyz2,375 pointsBadges:
  • Statefull firewalls

    Okay, let me start of with I "Googled" my question but I didn't really get a good answer. So I'm going to give it a shot here. Can someone please explain to me what is statefull firewalls, and whats the different between statefull and not-statefull firewalls?

    Tafiela55 pointsBadges:
  • What scenarios to test in Anti Virus software?

    What scenarios to test in Anti Virus software? Please give scenarios for writing test cases for testing a Anti Virus Software?

    Mayurkhe295 pointsBadges:
  • Barcode and fingerprint biometrics

    What is the definition of barcode and fingerprint biometrics?

    YEm5 pointsBadges:
  • HIDS

    Does host intrusion detection systems use heuristic based detection, which in turn uses a cipher key to determine if an alert should be triggered?

    EDUMEX12910 pointsBadges:
  • Information systems security

    Can someone elaborate on the best practices for access controls?

    poolplayer20 pointsBadges:
  • IT Security Consulting

    I am a student doing some research on the IT Security Consulting field. I was wondering if I could get a general break down of what the IT Security Consulting field entails and the main services that they offer to companies. Thanks!

    pboltn20 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following