• How to limit DDoS attacks?

    After the recent Spamhaus distributed denial-of-service attack, many DDoS service providers are concerned that targeted attacks are increasing along with bandwidth sizes. What should we do to minimize the threat of impending attacks?

    Michael Tidmarsh30,440 pointsBadges:
  • How to block pen drive and allow Dongle?

    In domain, how do I block pen drive and allow access to Dongle? How to update GPO regarding above mentioned query?

    123sane15 pointsBadges:
  • Dont want to pay alot for a enterprise backup software

    I have a customer that is on a tight budget and want to backup 20 servers remotley. Symantec and CA are all abou the same price 8-11k. Any enterprise backup software out there that is reliable and is a lower cost?

    Goofeydog20 pointsBadges:
  • Advice

    Please any one assist me. We have a small office and I would like to advice my boss that we should find IT people to come and run computer servicing and maintenance as well anti-virus renew. Since we purchased our PCs, we have never done that. Kindly help me on how I can write a letter. I already...

    Esk145 pointsBadges:
  • biometrics

    What are some of the pros and cons to biometrics

    ma5430 pointsBadges:
  • Need for police officers

    Do you think that the technology will improve to a point where police officers are not needed?

    ma5430 pointsBadges:
  • Securitiy Auditing in AS400

    Dear all ! In our company we are using power 720 server for our application. Some of us in the Admin side we have the access to all the objects and can do any changes. But i as a super admin i just want to record all the activities of another person like changes in PF and job ending and all...

    Sureyz2,405 pointsBadges:
  • Statefull firewalls

    Okay, let me start of with I "Googled" my question but I didn't really get a good answer. So I'm going to give it a shot here. Can someone please explain to me what is statefull firewalls, and whats the different between statefull and not-statefull firewalls?

    Tafiela55 pointsBadges:
  • What scenarios to test in Anti Virus software?

    What scenarios to test in Anti Virus software? Please give scenarios for writing test cases for testing a Anti Virus Software?

    Mayurkhe295 pointsBadges:
  • Barcode and fingerprint biometrics

    What is the definition of barcode and fingerprint biometrics?

    YEm5 pointsBadges:
  • HIDS

    Does host intrusion detection systems use heuristic based detection, which in turn uses a cipher key to determine if an alert should be triggered?

    EDUMEX12910 pointsBadges:
  • Information systems security

    Can someone elaborate on the best practices for access controls?

    poolplayer20 pointsBadges:
  • IT Security Consulting

    I am a student doing some research on the IT Security Consulting field. I was wondering if I could get a general break down of what the IT Security Consulting field entails and the main services that they offer to companies. Thanks!

    pboltn20 pointsBadges:
  • Network based security information system

    I want a lot of information on the title as I have a project on it. Can someone help me get started?

    toluwase5 pointsBadges:
  • SSL Wildcard Certification advice please

    I've never installed Wildcard SSL certs before. We want to implement them for our domains/subdomains. When asking the resellers it seems you need to have 1 Wildcard SSL cert PER server, but we use cloud servers & have subdomains residing on different VPSs. Is it possible to use 1 Wildcard SSL...

    lynngre5 pointsBadges:
  • Do you think Facebook knows too much about you?

    Social networking website Facebook has come under severe criticism for its privacy policy from users and tech geeks. Last year, the networking giant had changed its default privacy settings, allowing profile information to be shared on the Net, unless users specifically opted out. In March, it...

    Anu143525 pointsBadges:
  • Master thesis topic in (information) security

    Please suggest me some topic/title for my master thesis. I'm going to do my master degree in IT. I'm very confused, which problem should I choose for thesis. I was thinking for smartphone security or something similar. If you can suggest me any useful topic (smartphone or may be other). Thanks in...

    denialwayne10 pointsBadges:
  • Event View Error Message

    Hi, I just started learning about Exchange Server 2003, and I have no idea what those error (warning) messages are. Most of these messages are the messages I receive everyday. Please look at it and give me some solution. Verify that the Microsoft Exchange MTA service has started. Consecutive...

    AnswerAll0 pointsBadges:
  • Kaspersky Internet security reusability

    I'm using Kaspersky Internet security and only 60 days left on it. I want to format my laptop. Is it possible to use the same security code after formatting my laptop?

    swarnaramya5 pointsBadges:
  • How to protect an Excel sheet from printing?

    How can I protect my Excel sheet from printing so that if anyone tries printing it, they're not able to get a printout?

    Jaideep Khanduja9,115 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following