• Which is more secure: Forgotten password or reset link?

    I've been recently been doing some studying on different security topics and I came across this: Is it more secure to send out a password reset link when a user forgets their password or send the original password unencrypted in an email? Now obviously I know not encrypting a password is bad...

    ITKE351,965 pointsBadges:
  • How to protect webserver hacked?

    I have some questions to protect web-server as below: Can you please tell me where is the leak of my security? Why my server is hacked, can you please tell me the possible reasons? How can I protect my server from hacker?

    seoboostertips15 pointsBadges:
  • Security implications of a password blacklist

    Does maintaining a password blacklist on database create any security risks?  Basically, I'm looking to create a list of 500 or so commonly used passwords to stump very basic automated spambots.

    ITKE351,965 pointsBadges:
  • I might be creating a virus accidentally. What should I do?

    This has been happening to me a lot lately...I'm writing an application in Delphi and after I compile it, my antivirus scanner is telling me that I'm actually creating a virus and it immediately deletes the executable again. It's easy to fix (by doing a full rebuild) or simply waiting but it's...

    ITKE351,965 pointsBadges:
  • Internet access restriction via GPO

    I need to restrict internet access in a particular department in my organsation and i need a way by i cld do that using Group Policy

    Wachen60 pointsBadges:
  • I’m getting several suspicious connection attempts. What should I do?

    I'm currently running Mac OS X and I currently have a system firewall and stealth mode enabled. When I opened up my system console, I discovered a ton of blocked connection attempts from different places that I'm not familiar with. I've actually checked the locations are some are located in China...

    ITKE351,965 pointsBadges:
  • Dead drop email strategy: Is it actually secure?

    I'm read in the news lately (online and print) that people are starting to conceal their email traffic. So instead of sending emails to a person's inbox, they're writing messages but leaving them in a draft folder or dropbox. Then the other person would log onto the same account and look at the...

    ITKE351,965 pointsBadges:
  • How secure is Identity-Based encryption?

    Over the past several years, I was always taught to never create my own crypto algorithm. But now I'm looking into Voltage SecureMail (which does use identity-based encryption) and I think I'm way over my head in trying to figure out the quality of the system.If you've used Voltage before, I'm...

    ITKE351,965 pointsBadges:
  • Configuration of NAC Appliances

    I will like someone to help me with configuration example of these three cisco devices in a university campus network; cisco NAC 3355 NAC Manager, Cisco NAC 3315 series NAC Server and Guess Server. We just bought the equipment and I was saddle with the responsibility to make it work for the...

    ralph12360 pointsBadges:
  • Why do websites force us to use passwords of a specific length?

    What is the reason that websites have very specific directives about the type of password and it's length that you can enter (8 characters with 2 being numbers, etc.). Are there technical reasons why its this way other than to stop stupid people from entering passwords that are easy to crack?

    ITKE351,965 pointsBadges:
  • Thoughts on a multiboot system with encryption and pre-boot authentication

    I'm running a system that runs Windows 7 and Windows XP, with Red Hat soon to be added. All this in conjunction with Grub 2 boot loader. How would I go about setting up a multiboot system with hard drive encryption and pre-boot authentication?I know TrueCrypt could be used to pre-boot...

    ITKE351,965 pointsBadges:
  • How do you insure that a file uploaded through web page is safe?

    How do you insure that a file uploaded through web page is safe? On our site, we plan to allow users to upload PDFs and TIFF images, but are worried that someone could purposely or by mistake upload a file virus. Are there any programs that can be used to scrub such files? I understand that it is...

    ITKE351,965 pointsBadges:
  • Email security: Zipped content

    One of my good friends, he's a developer and wanted me to ask this question on the forum. He currently sends a DLL or EXE file to one of his customers (who's a part of a big company). This is his process:Rename the executable file (module.dll -> module.d__)zip the file with password so that it...

    ITKE351,965 pointsBadges:
  • Are our powerline adapters secure?

    Our company is using 2 Zyxel PLA407 powerline adapters. We currently have one router downstairs that's connected to one adapter. The other is located upstairs (currently 30 feet away connected to a desktop). We've recently noticed that the speed is much faster when you just plugin, rather than...

    ITKE351,965 pointsBadges:
  • Cisco ASA Enable isakmp for certain ip address

    On a cisco ASA if you issue the follow command 'crypto isakmp enable outside' it allows for all external ip address to try to establish a vpn tunnel, is there a way to filter the request down to a certain ip address ? Example Only accept udp 500 reqest from 2.2.2.2 ?

    KWOLBERT5 pointsBadges:
  • Security: How does a crypter actually work?

    I'm studying to become a security expert and I've recently come across the idea of a "crypter". I'm talking about how these crypters encrypt files (such as viruses and keyloggers) so they can bypass antivirus detection. But I'm curious on how they actually work. Can someone help me with a brief...

    ITKE351,965 pointsBadges:
  • Why does encryption take longer than decryption?

    Why does it take longer for a system to process encryption than decryption? That seems to be the case from my experience using AES. I would think the act of decrypting files would take much longer.

    ITKE351,965 pointsBadges:
  • Firewall configuration Testing

    I need to do some tests of my firewall configuration. Specifically, I have to run a policy audit independent of any config management systems with an eye to inspecting Cisco PIX/ASA/FWSM and Juniper NetScreen/JunOS devices. Of secondary important (but they have to be done) are reviewing iptables...

    ITKE351,965 pointsBadges:
  • Web Application Firewall question?

    Could someone tell me what a Web Application Firewall is and how to tell if it is a good one? Also, is there a reason you would use one instead of an IPS?

    ITKE351,965 pointsBadges:
  • Sonicwall Zones and DHCP

    I have a network with a Windows Server acting as my DHCP server. I have a Sonicwall TZ215 with 3 zones. The first two are for intranet and internet connectivity, and are password protected. Zone 3 is meant to be used as a wireless router for internet only for our guests.I have other 'local'...

    Pesach5 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following