• Security

    Can someone tell me how you handle user security since it is no longer available in Access 2007 or 2012. I have a database that I need to pick and choose who can edit certain forms.

    bgharrod5 pointsBadges:
  • 48port switch

    Which one is best for functionality of 24port managed switch or 48port managed switch

    Padhu5 pointsBadges:
  • Encryption by Law? If so, what strength or type?

    Should encryption be explicitly proscribed in Data Security and Privacy legislation like the Massachusetts Data Prvacy Law and the White House cybersecurity initiative? If so, what strength or method? Should there be a minimum strength? What do you think? Troy Tate, thanks, are you recommending the...

    SarahCortes30 pointsBadges:
  • Event log on Cisco ASA 5500

    Having issue configuring logging on my ASA 5500.  Just want to log error messages and warnings.  Have tried logging configuration commands below with no luck.  Is there a command I may be overlooking? [strong]logging enable[/strong] [strong]logging buffered[/strong] 4 logging-buffer size (#)

    Sgtosiris20 pointsBadges:
  • Confidential Information Theft

    I suspect a company who is managing my business stealing or at least know private information which they are not supposed to do. Private memo and things. Is there a way for me to detect how they are doing it. Want to catch then red handed.

    rising12510 pointsBadges:
  • Certification

    How do I go about getting Iso 27001 and Soc2 cert for ssae - 16? Are there consultants who can come in plan nd implement the thing for a startup

    penny1250 pointsBadges:
  • Mobile Antivirus

    I want to build an antivirus for android...so I need virus signature database...while surfing through net I could find that Dr. Web deals with android viruses...i downloaded one of its virus database...but its VDB...my system is not recognizing the software with which I can open it...I also tried...

    TKK55 pointsBadges:
  • Is my router WRT120N still effective?

    I am using CISCO router WRT120N in my Internet Cafe. Now I have a plan to increase the number of computers to 50 PCs. Is my router WRT120N still effective? Note: I don't provide Wifi for clients.

    Markken20 pointsBadges:
  • SSL for AHS (SSO enabled)

    Hi, I created the SSL certificate and I installed successfully for SSO enabled application. but it does not allow me to get inside the application . It says " Authorization required

    santtomcat90 pointsBadges:
  • mobile ad hoc network security issue

    I need to apply a security issue in mobile Ad Hoc network using IPSec and I need to simulate it using NS 2 simulator. If any one can help me, I say G bless you. Your brother, Daniel.

    daniboy655 pointsBadges:
  • According to the Searchsecurity.com, what is phishing?

    What are two ploys phishers commonly use?

    lmcstudent15 pointsBadges:
  • Problem after installing SP1 on Win 2003 SBS

    Hi,this weekend i updated the server with sp1 and know i am having problems with the client computers and users when trying to log on the domain. It looks like an DNS problem but i am not sure. I run the DCdiag /test:DNS utility with this results. C:WINDOWSServicePackFilesi386>dcdiag /test:DNS...

    polayo125 pointsBadges:
  • ISERIES SFTP

    SFTP software iSeries Windows Server?

    carlosjavier10 pointsBadges:
  • How to import the ssl certificate in Tomcat

    hi, i created the certificate(hrac.crt) and ca (server-ca)also. how to import the ssl certificate in tomcat web server. please note i dont want the process for self signed certificate

    santtomcat90 pointsBadges:
  • How to log in new screen name on used computer

    How do i log in new screen name on a used computer?

    tippdsaunders15 pointsBadges:
  • sophos

    I have always problem wih sophos.

    youceflabed10 pointsBadges:
  • Will the Kaspersky OS experiment work?

    Kaspersky Labs recently confirmed rumors that it is building an operating system aimed exclusively at protecting industrial systems from malware. Think it will be a success? What issues do you see with the company's approach?

    Ben Rubenstein3,965 pointsBadges:
  • ISO 27001 implementation, start to finish

    Hello, I am a student at University of Advancing Technology in the BS network security program and have been assigned to ask a question on a one of the security frameworks we are studying. My question is to anyone who has implemented the ISO 27000 family of security frameworks what was your...

    trashurt6310 pointsBadges:
  • Application Policy

    Good Morning EveryBody; we are trying to make a new application policy in our company..(Background- we have a number of people here who make small to medium application to meet our needs and requirenmnet)BUT they do not follow standrads and guidelines...i mean they do not have even application...

    secOfficer385 pointsBadges:
  • Geofencing and Jailbroken Apps

    I am part of a start up that is creating apps that use "geofencing" to authenticate a user. The app is only supposed to work if the user is within a specific geofence. The problem we're foreseeing is that jailbroken phones will be able to trick the app / phone into thinking it's somewhere that it's...

    344kellogg10 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following