• How do you insure that a file uploaded through web page is safe?

    How do you insure that a file uploaded through web page is safe? On our site, we plan to allow users to upload PDFs and TIFF images, but are worried that someone could purposely or by mistake upload a file virus. Are there any programs that can be used to scrub such files? I understand that it is...

    ITKE351,850 pointsBadges:
  • Email security: Zipped content

    One of my good friends, he's a developer and wanted me to ask this question on the forum. He currently sends a DLL or EXE file to one of his customers (who's a part of a big company). This is his process:Rename the executable file (module.dll -> module.d__)zip the file with password so that it...

    ITKE351,850 pointsBadges:
  • Are our powerline adapters secure?

    Our company is using 2 Zyxel PLA407 powerline adapters. We currently have one router downstairs that's connected to one adapter. The other is located upstairs (currently 30 feet away connected to a desktop). We've recently noticed that the speed is much faster when you just plugin, rather than...

    ITKE351,850 pointsBadges:
  • Cisco ASA Enable isakmp for certain ip address

    On a cisco ASA if you issue the follow command 'crypto isakmp enable outside' it allows for all external ip address to try to establish a vpn tunnel, is there a way to filter the request down to a certain ip address ? Example Only accept udp 500 reqest from 2.2.2.2 ?

    KWOLBERT5 pointsBadges:
  • Security: How does a crypter actually work?

    I'm studying to become a security expert and I've recently come across the idea of a "crypter". I'm talking about how these crypters encrypt files (such as viruses and keyloggers) so they can bypass antivirus detection. But I'm curious on how they actually work. Can someone help me with a brief...

    ITKE351,850 pointsBadges:
  • Why does encryption take longer than decryption?

    Why does it take longer for a system to process encryption than decryption? That seems to be the case from my experience using AES. I would think the act of decrypting files would take much longer.

    ITKE351,850 pointsBadges:
  • Firewall configuration Testing

    I need to do some tests of my firewall configuration. Specifically, I have to run a policy audit independent of any config management systems with an eye to inspecting Cisco PIX/ASA/FWSM and Juniper NetScreen/JunOS devices. Of secondary important (but they have to be done) are reviewing iptables...

    ITKE351,850 pointsBadges:
  • Web Application Firewall question?

    Could someone tell me what a Web Application Firewall is and how to tell if it is a good one? Also, is there a reason you would use one instead of an IPS?

    ITKE351,850 pointsBadges:
  • Sonicwall Zones and DHCP

    I have a network with a Windows Server acting as my DHCP server. I have a Sonicwall TZ215 with 3 zones. The first two are for intranet and internet connectivity, and are password protected. Zone 3 is meant to be used as a wireless router for internet only for our guests.I have other 'local'...

    Pesach5 pointsBadges:
  • How secure is Windows Defender?

    I'm looking to get Windows 8 specifically but I want to know how secure is its antivirus (Windows Defender)? Here are some of the questions I have: How much can I trust windows defender? Is it better than regular AVs like Kaspersky/AntiVirus? Any help you can give me would be much appreciated.

    ITKE351,850 pointsBadges:
  • Does a sysadmin know your password?

    I'm a software engineer at a small company. We've been having problems with our email hosting service. Not so much the company, but the service. While working through the issue with our sysdamin, he asked me for my password and I gave it to him without thinking. Later, it occurred to me that no one...

    ITKE351,850 pointsBadges:
  • Testing a EMV chip based card

    How is testing of a EMV chip card different than testing a magnetic striped card? What extra features need to be tested for an EMV chip card compared to a magnetic striped card?

    vadirajm5 pointsBadges:
  • Security: Sending a password / username over HTTPS

    Inside of my friend's website, when a user logs in, they send their username / password to him over HTTPS. Besides having a SSL, there isn't a special obfuscation of the password (it's living in memory in the browser).Is there anything else he should do to tighten security? Should he keep it...

    ITKE351,850 pointsBadges:
  • What should the process be to remove users on leave?

    Typically when a user goes on disability, short term, or parental leave, do you disable their AD? What about their exchange? RSA? Smartphone?Also, is there usually a process to inform them that you are disabling their access?

    sfuboy5 pointsBadges:
  • Microsft Visual Studio performance issues do to antivirus software

    Does anyone know which antivirus program causes the least amount of slowdown while working in Microsoft Visual Studio? Every time my virus checker goes off I run into serious performance issues due to the system check. Does this happen to other people? Do you think the issue is the virus checker or...

    ITKE351,850 pointsBadges:
  • How to become a security expert?

    Hi, How do I become an expert as a security analyst? I graduated from business IT field without security knowledge. What area should I start studying with? Some people suggested me to take CEH first. What do you guys think? Is CEH a good cert to start with?Appreciate any feedback :)

    user7775 pointsBadges:
  • Transmitting encrypted PDFs via email

    Hi! I could use some help. My company plans to send out critical data to our clients in encrypted PDF format. Is there a danger that they could be blocked in the future as virus scanners become more sophisticated and conclude that they could be carrying malware?

    ITKE351,850 pointsBadges:
  • How do you protect a server against Denial of Service attacks?

    How do you protect a server against Denial of Service attacks? What techniques do advanced firewalls use to protect against DoS/DDoS attacks?

    ITKE351,850 pointsBadges:
  • Can I use off-the-record style encryption for my emails?

    I'm new to the security world but I know that instant messaging uses "off-the-record" encryption (which means that a user would get authentication, encryption and forward deniability). But for my email, all we use is GPG/PGP, which offers authentication and encryption but doesn't allow forward...

    ITKE351,850 pointsBadges:
  • Tellabs 532L DACS password

    Does anyone know how to reset Tellabs 532L DACS back to the factory default of TELLABS?

    comstock5 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following