• HIPAA compliant process for password recovery

    What is the HIPAA compliant process for password recovery?

    kmcnulty5 pointsBadges:
  • What is a pop-up blocker?

    What is the pop-up blocker and what is the role in my browser?

    KassabMhd5 pointsBadges:
  • How can I improve security in the cloud rather then traditional security?

    In cloud security we generally see that there is traditional security like authentication, verification, etc. Is there is any security rather then traditional security?

    Darakhshinda5 pointsBadges:
  • How can I find the location of a hacker?

    Is there any way to find a person location and identity?

    yatils135 pointsBadges:
  • Forgot Password for iMac

    I forgot my password for my iMac and it doesn't provide a 'FORGOT PASSWORD" option. How can I reset it if I don't remember the original password?

    dneway5 pointsBadges:
  • AS/400 Secure FTP on V4R3

    I need to know if our AS/400 V4R3M0 can perform secure FTP. If not what version and release do I need to upgrade to.

    Pamtobin35 pointsBadges:
  • Do any browsers have support for pre-shared-key encryption/authentication?

    My partner and I already have a web application with highly valuable business data. All of our communication is encrypted through TLS/SSL. I know this is a safe protocol but it can still be compromised if someone installed a CA certificate through our computer. So we're trying to strengthen the...

    ITKE828,125 pointsBadges:
  • What is the use of the “secret” displayed when setting up 2 Factor Authentication?

    Is there a purpose to the 'secret' that is always displayed when I take a picture of the QR code to setup a two-factor authentication on a non-Google site? Do I even need it? If I save it, wouldn't anyone be able to get in with the login code?

    ITKE828,125 pointsBadges:
  • How to Practice Properly for Security+ Certification?

    I have given CompTIA security+ online exam once but I wasn't able to clear that. Please let me know the best methods for preparing for CompTIA Examination

    XtremeNavi15 pointsBadges:
  • What do you think about Privatoria.net? Can I trust them?

    I found such interesting security service Privatoria.net. It is a complex of secure services such as VPN, Anonymous E-mail, Secure chat, data transfer, etc. But I don't know if I can trust them. What do you think?

    MinerAnonym15 pointsBadges:
  • Block Site for employees in office

    Hello, I have to block some sites for employees in my office. How do I do that?

    talha1235 pointsBadges:
  • non-existant ei_209.msi file in Windows XP

    While attempting to re-install Eset NOD32 anti-virus software on a clients computer with Windows XP, installation fails due to "a network error while attempting to read from the file: C:\WINDOWS\Installer\ei_209.msi" I have searched said subdirectory and found no such file.  Running their stand...

    mbs27535 pointsBadges:
  • Don’t give users DomainAdmin rights

    I would like to give highest privileges to some of my IT users on the AD, but don't want to give them DomainAdmin rights. What are potential built-in groups that can achieve that target? Thanks!

    Tguedda5 pointsBadges:
  • SIP trunking issue: Authentication problems (CUCM and own developed PBX)

    Hey, I have built a PBX by using the Ozeki SDK and and want to connect it to my existing Cisco Unified Communications Manager PBX by using SIP trunking. By following the instructions of this Cisco setup guide, I have successfully connect the SDK to CUCM, but SIP trunking does not work, because of...

    RajeshCO275 pointsBadges:
  • Which security certification should I go for?

    I am working as Linux Admin and have 6 years of combined experience in system administration (Linux & Windows), network administration (routers, switches and firewall). I want to move on to security field. Which certification/course I should go for?

    nileshdc820 pointsBadges:
  • How to use deadlock handling

    How can I use deadlocking handling? Is this a legitimate security method?

    priyarapolu5 pointsBadges:
  • Authority to view a user profile

    I want to grant authority to our technical support personnel to see a user profile. How can I do this without giving them *ALLOBJ authority, or granting them object authority against each individual user profile?

    KDCKnowlton5 pointsBadges:
  • Make SSL faster with Apache 2.4 and Linux CentOS 6

    colleagues!   Well, I am with a huge problem with the speed of SSL Authentication. Since I move my website to SSL, the GoogleBot reduce the indexing of my website, because the SSL Negotiation is with below value I got with WebPageTest.org:   URL:...

    espack5 pointsBadges:
  • How can I prove if I’ve been hacked?

    Hi, I have a Huawei Wi-Fi type HG523E home gateway and I'm suspicious over my national telecom company technician being hacked. I see my MAC address from the label device is different from when I detect with other third party software. Then sometimes, a few days ago, when I type Google.com but the...

    Lither5 pointsBadges:
  • Algorithm for removing the viruses

    Hi, I am looking for the name of algorithm that the antivirus software use it for "Removing" the viruses not for detecting. I just found a lot of algorithms for detecting the viruses, but I really want to know the process after detect a virus. Thanks in advance, Amjad

    AmjadAmer5 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

Thanks! We'll email you when relevant content is added and updated.

Following