• Transfer coverage to another computer

    I have Norton for three computers and want to take it off one of them and put it on a new computer? Can I do this?

    Madned0 pointsBadges:
  • Cyber-squatting

    What exactly is cyber-squatting?

    Melware20 pointsBadges:
  • Is it possible to use the same SSL certificate in different windows server

    Is it possible to use the same SSL certificate in different Windows Server. I have an URL (abc.mydomain.com) it is configured in two web servers. These two web servers are hosted in different windows server. In such cases, how may certificates should I order?

    santtomcat90 pointsBadges:
  • What types of Layer 4 (L4) or transport layer switch exist?

    How many kinds of Layer 4 switches are there?

    NetworkingATE1,545 pointsBadges:
  • Where can I find network diagrams of Layers 1-7?

    Where can one find Layer 1, Layer 2, Layer 3, etc. network diagrams? It seems that different companies have different ideas of what should be displayed in each diagram. Is there a uniform book with clear samples that one can follow?

    NetworkingATE1,545 pointsBadges:
  • Antivirus for external hard disk

    I have 1TB external HDD. I want to know if it is possible to install any antivirus in my external hard drive because I might plug it in another computer that doesn't have an update and that has a virus. Which one is good antivirus for external hard drive?

    pdsathishkumar3,790 pointsBadges:
  • Project Tools For Risk

    Good evening folks, recently I have tested out a risk management software tool and was wondering if there are any more?

    rogerblackwell150 pointsBadges:
  • Why use Layer 3 switches and how do they differ from Layer 2 switches?

    Why do we use Layer 3 (L3) switches, and how are they different from Layer 2 (L2) switches?

    NetworkingATE1,545 pointsBadges:
  • How can I keep a Windows folder from being moved accidentally

    Is it possible to lock down the folders (or directories) within Windows, so they can't be accidentally dragged and dropped into some unknown location? With multiple users using the same files, we are finding that the Windows folders are disappearing. I was wondering if there is a way of locking the...

    Jbercsik5 pointsBadges:
  • What impact will President Obama’s cybersecurity order have on the industry?

    President Obama issued his long awaited Cybersecurity executive order which is aimed at improving public-private information sharing. However, many skeptics believe this order won't get anything done. Do you think Obama's executive order will go through? What impact will it have on the...

    Michael Tidmarsh28,395 pointsBadges:
  • What security trend worries you the most for 2013?

    According to a recent TechTarget survey, compliance, viruses and mobile were among the top security priorities for respondents and their companies in 2013. What security trend worries you the most in 2013? Will companies see an increase in cyber attacks this year?

    Michael Tidmarsh28,395 pointsBadges:
  • Change email address and password

    I forgot my password and my email address had been disconnected. How do I get my pass code?

    1959199710 pointsBadges:
  • Skype Hacking

    When I use skype, my calls are often REDIRECTED to someone else. This happens when I make Skype-to-Skype calls, and also when I make Skype-to-phone calls. They also spoof the id's of my contacts to make Skype-to-Skype calls to harass me. How do they do this? How can I stop them?

    Hayboy30 pointsBadges:
  • Architecture

    How to design network security architecture efficiently?

    n56110 pointsBadges:
  • What skills would be most valuable for the cyber force?

    A lack of people with the appropriate skills is widely acknowledged on both sides of the Atlantic as being a major challenge to bringing national cyber defense capabilities up to standard. What skills would be most valuable for the force look for in potential hires?

    Michael Tidmarsh28,395 pointsBadges:
  • Did he extract my hard drive information with his USB key under the guise of loading a Wi-Fi printer on my laptop?

    Someone was "helping me out" by loading the Wi-Fi printer info on my laptop. When the USB key was inserted, it extracted information from my laptop first, very fast. Then it downloaded the printer program and asked for set-up. I am highly suspicious as to why the the USB key didn't, upon insertion,...

    Quivvy0 pointsBadges:
  • Login and password

    We are trying to get into our portal on the Deepwater horizon site. I have asked and received confirmation for a new password and login i.d. 3 times. They sent me a confirmation of my password but when we tried to login, it ask for the information to establish a claimant. When we filled this out it...

    shrimp5 pointsBadges:
  • Stopping EMF radiation from a server room for security

    I want to shield one room against EMF emitted by the computers from escaping the room. This is for security of the data, not some crazy health craze. Will a simple faradays cage suffice? Should I ground the cage? What about the power lines and LAN lines and phone lines that could potentially emit...

    bing135120 pointsBadges:
  • Running a script

    I have a compliance requirement to convert all FTP jobs to SFTP. However SFTP does not work on Windows 2008 server the same way it works in Unix or AS400. In windows 2008 server, when you send a file via SFTP, it can only place it on local hard drive of that server. Currently, our production 'XYZ'...

    ravula700 pointsBadges:
  • How big of a risk is BYOD?

    While more companies are inviting employees to 'bring their own device' to work, many still see BYOD as a potential security risk. According to a recent survey by (ISC)2, 78% of security professionals say the trend presents a 'somewhat' or 'very significant' risk. How big of a concern is BYOD to...

    Michael Tidmarsh28,395 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following