• Windows server 2008 disk space problem

    Hi. I have installed Windows 2008 server, and on this platform Forefront firewall. I have a problem: Disk C volume is 30 GB. When I looked up the properties of Disk C, there is 22 GB used space but when I looked up total folders volume on Disk C, all of the volume is 11 GB (Include hidden folders)....

    Eliyevelxan1,235 pointsBadges:
  • What’s the difference between cloud security solutions for ISPs clients and known security program for PC

    What is the difference in performance bet' cloud security solutions for ISP's clients and security program for PCs (like Norton security program for instance)?

    a1b1c1d1e525 pointsBadges:
  • What is the best way to store usernames and passwords within Android applications?

    Should I approach this through this through the preferences screen or code a dialog box into which users can input their details? Either way, how should I arrange security for the app?

    ITKE352,565 pointsBadges:
  • Ghost imagaing

    Hiya all, Specs first.. Ghost Corporate multicast server 7.5. Switches are all 3com, 10/100. Wireless network is 10mg network ports (2) shared via 2 wirelss access points, (D-Link 22Mbps) Problem is, whenever i image multiple machines, the whole network goes slow. The machines affected are old and...

    Carl0s810 pointsBadges:
  • How can a general user trace the origin of TCP/IP data generated by persistent e-mail anomaly?

    Thank you very much for taking time to consider this question. What do you recommend for a general user who needs to trace the origin and route of TCP/IP data associated with an e-mail message? My SOHO computer is infected by some form of malware. The ISP's tech support could not resolve it; the...

    Troubleshoot201415 pointsBadges:
  • Removing SATA HDD passwords

    Hi, Is there a program that can be used to recover or remove SATA HDD passwords?

    Xxx385 pointsBadges:
  • Help! Hackers keep getting in my computer

    I have been hacked for months and I dont know what to do to keep them out. I am not a expert on the computer but I get what I need done, but I was totally unaware that what has happened to me is possible. I got Kevin's book "Hacking for Dummies" to try & learn some of the things I see.  I am...

    Stevie9265 pointsBadges:
  • What should I do to stop people from hacking or tampering my computer?

    I did a chat in a website with a person. Just after few days after, my computer started showing error certificates. (We had Kaspersky internet security set up in it). After that, my CMOS battery failed. I couldn't use Mozilla Firefox and a lots more has changed. Now what should I do to stop this...

    Kittu15Tamilnadu25 pointsBadges:
  • How do I get started in cyber security?

    I want to know the best way to begin learning about cyber security: Should I start with college? Is information technology the best major to pursue or should I pursue computer science? I've read that a bachelor's or degree isn't necessary for cyber security careers and if this is true, what is the...

    rockodubbz5 pointsBadges:
  • Who is legally liable for information on employee devices?

    If illegal software and images are on a BYOD who is liable. I have been involved in some cases and this involves my background working with police and computer forensics investigations. It is very clear to me that company directors and IT Management and directors have got this very wrong. Look...

    hrmp7775 pointsBadges:
  • What is Port 443? Why do SSL VPNs make use of it?

    I am setting up a Web SSL VPN for remote access across my WAN. Can someone explain why SSL VPNs use Port 443? Can I use any other port?

    SearchEnterpriseWAN1,095 pointsBadges:
  • Bypassing FortiGuard web filter

    I want to know if can we bypass our fortiguard web filter. By any means, I have tried all the different VPN software and proxy sites but it's still not working. Torrent is also blocked. Is there any way to by pass it? Please help.

    faisalahd5 pointsBadges:
  • Open IT Forum: What do you want to see from IT Knowledge Exchange in 2012?

    We asked what your goals are for late 2011 and early 2012, but now we want to know what you hope to see from the IT Knowledge Exchange community. If there's a functionality you would like to see, or a topic you want to know more about, let us know in the discussion section! Don't be afraid to get...

    MelanieYarbrough6,345 pointsBadges:
  • How to troubleshoot firewall installation

    How can I troubleshoot my Firewall installation?

    reddel5 pointsBadges:
  • Who is responsible for Information Security?

    I'm an online at UAT and the question I ask is in regards to InfoSec should there be someone ultimately responsible or should there be a committee of different areas to make up the final task?

    zacpack5 pointsBadges:
  • What is an Access Password?

    I have never been asked for an Access Password. Now my login screen asks for this and we have no idea why, or what the password is. Where do I turn from here?

    kriwil5 pointsBadges:
  • Remote Networks Routing not working

    danyortiz20 pointsBadges:
  • ISO/IEC 27001 IDEAL Model

    Hello, i'm a student at UAT and for class we are talking about the Pro's and Cons of Frameworks. For this i'm going about ISO/IEC 27001 Implementation Framework, The IDEAL Model, from the Software Engineering Institute. First the Pros to this, i feel that the IDEAL model goes more in depth than the...

    Krylar5 pointsBadges:
  • Forgot Password using SiteMinder

    Can anyone of you guide in implementing the "forgot password" option using siteminder

    Matheen5 pointsBadges:
  • Changing password and signature after being hacked

    I am a novice user. After being hacked, I need to change my password and signature, but I don't know where to find them.  Thanks for any help.

    staarxx325 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following