• Is it possible to block souce IP’s by their presence in a BotNet?

    A friend of mine in the security industry recently told me that many DOS attacks and general "black hat hacking" attacks usually happen over the TOR network. Would it be possible to dynamically block source IP's by their presence in a BotNet?Would this be effective in blocking DDoS attacks? How...

    ITKE350,840 pointsBadges:
  • Middle ground password security policies

    What password policies are the best without going crazy? We want security but changing passwords 2 times a month is too much. What is a healthy middle ground between security and convenience?

    TeachMeIT975 pointsBadges:
  • Does SSL equal secure email through transit?

    If an email server sends messages via SMTP/SSL and the recipient uses SSL to receive his email, will the message be secure through the entire transit? Des this mean the e-mail will be delivered in plain text between the servers?

    ITKE350,840 pointsBadges:
  • Passwords stored in memory: Is it safe?

    I recently realized when you save a password in a variable, it's actually stored as plain text in the memory.I know the OS does a good job by forbidding processes from accessing other allocated memory. But isn't it still bypassable? Is there a safer way to store passwords to make sure processess...

    ITKE350,840 pointsBadges:
  • I’m looking for a stronger authentication method for web services

    I deployed a two-factor-authentication solution in order to strength logon to our web applications. The majority of our users who have new tokens are also pop3/imap users (this is from a long time ago). However, I noticed web applications are well protected by 2FA , but mail applications is an easy...

    ITKE350,840 pointsBadges:
  • Generating strong, unique and memorable passwords

    Can someone help me with good strategies for generating personal passwords that are unique and strong, but easy to remember?

    ITKE350,840 pointsBadges:
  • Does a Firewall that allows ICMP pose a security risk?

    What are the security implications for a firewall that allows ICMP? Are there times where it should be turned off?

    ITKE350,840 pointsBadges:
  • Intercepting two-factor authentication (SMS)

    I'm trying to learn more about "IT Security" and I've come across two-factor authentication. I understand two-factor authentication mechanisms use SMS to deliver single-use passphrase to the user. But how secure is it? Is it hard to intercept the SMS message containing the passphrase? Do mobile...

    ITKE350,840 pointsBadges:
  • Testing stateful firewall with TCP/IPv6

    This may seem as a general question but I'm wondering how experienced users actually test "stateful firewall" with TCP/IPv6. I would include these two tests:Echo reply without requestTCP ack without synIs there anything else other than this? Especially that pertains to IPv6?

    ITKE350,840 pointsBadges:
  • Email security on registration form: Is it safe?

    A member of our team has been making updates to one of our sites and he implemented a feature (on the registration form) that checks if an email address is still available for use. But he's nervous if it's secure to show a user if an email address is already taken.Could it be a security risk for...

    ITKE350,840 pointsBadges:
  • Proxy Server

    I'm using a Lenovo computer. This computer has a WiFi Network but it's not connected to the proxy server. The problem is happening anytime I open any web page.

    rameshselvaraj50 pointsBadges:
  • Do spaces in paraphrashes add more security?

    When using paraphrases I often see extra spaces added to the sentences. Does this provide more security than a single line of attached character text?

    ITKE350,840 pointsBadges:
  • My program is being blocked by my antivirus software (AVG)

    I recently created a program that I've been working on that downloads files. It's been working fine until a user is using AVG. It seems that in order to fix the issue, AVG's "Email Protection" must be disabled. I've already tried adding either my program or the JRE to an exceptions list. It doesn't...

    ITKE350,840 pointsBadges:
  • Skipped Items

    Why when I run a full scan, there is a large number of, "skipped items"? Does this mean that these items are not being evaluated for possible viruses?

    jackkrol5 pointsBadges:
  • How do I make sure someone isn’t stealing my password?

    I travel a lot for my company and have been doing some work in third-world countries lately. I've been using the Internet at different Internet cafes and I'm worried about if anyone could have stolen my password or listen to my keystrokes. I've heard one way to get around that would be to write...

    ITKE350,840 pointsBadges:
  • Trying to figure out if my email will be routed securely

    I'm trying to connect to my email server via SSL (SMTP/SSL) and I know the recipient also only checks his email via SSL (web/https or IMAP/SSL). Does anyone know if this increases the security for the message content in any way? What I mean is will the communication between my providers email...

    ITKE350,840 pointsBadges:
  • Why does my organization make us change our password every 90 days?

    The company I work for makes us change my password every 90 days. I know this is commonplace for many organizations but I'm trying to find out if there is a specific vulnerability that it's designed to counter. Or is it just good practice to be done?I know it's a general security question but it's...

    ITKE350,840 pointsBadges:
  • Password error

    please help me solve my wifes answering book turbo pascal. I'm not expert to this field but I'm trying to study it myself. i cant solve this one. here it is: Write a program that have a password, and if the password enter 3 times is failed, it will appear 'error'. I would greatly appreciate those...

    haroldbolambao5 pointsBadges:
  • Edge Router Firewall Question

    Is there a reason why I should run VPNs and Reflexive ACLs on a firewall with NAT + routing functions on the router, if the router alone can take care of it?

    ITKE350,840 pointsBadges:
  • Protecting PDF Files

    I got some documents printed the other day at a local print shop. I noticed that they moved my PDF from my flash drive to their desktop. Is there a way to protect my files without using a password? Is there a way to make a file open once and after that encrypt it?

    ITKE350,840 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following