• Statefull firewalls

    Okay, let me start of with I "Googled" my question but I didn't really get a good answer. So I'm going to give it a shot here. Can someone please explain to me what is statefull firewalls, and whats the different between statefull and not-statefull firewalls?

    Tafiela55 pointsBadges:
  • What scenarios to test in Anti Virus software?

    What scenarios to test in Anti Virus software? Please give scenarios for writing test cases for testing a Anti Virus Software?

    Mayurkhe295 pointsBadges:
  • Barcode and fingerprint biometrics

    What is the definition of barcode and fingerprint biometrics?

    YEm5 pointsBadges:
  • HIDS

    Does host intrusion detection systems use heuristic based detection, which in turn uses a cipher key to determine if an alert should be triggered?

    EDUMEX12910 pointsBadges:
  • Information systems security

    Can someone elaborate on the best practices for access controls?

    poolplayer20 pointsBadges:
  • IT Security Consulting

    I am a student doing some research on the IT Security Consulting field. I was wondering if I could get a general break down of what the IT Security Consulting field entails and the main services that they offer to companies. Thanks!

    pboltn20 pointsBadges:
  • Network based security information system

    I want a lot of information on the title as I have a project on it. Can someone help me get started?

    toluwase5 pointsBadges:
  • SSL Wildcard Certification advice please

    I've never installed Wildcard SSL certs before. We want to implement them for our domains/subdomains. When asking the resellers it seems you need to have 1 Wildcard SSL cert PER server, but we use cloud servers & have subdomains residing on different VPSs. Is it possible to use 1 Wildcard SSL...

    lynngre5 pointsBadges:
  • Do you think Facebook knows too much about you?

    Social networking website Facebook has come under severe criticism for its privacy policy from users and tech geeks. Last year, the networking giant had changed its default privacy settings, allowing profile information to be shared on the Net, unless users specifically opted out. In March, it...

    Anu143525 pointsBadges:
  • Master thesis topic in (information) security

    Please suggest me some topic/title for my master thesis. I'm going to do my master degree in IT. I'm very confused, which problem should I choose for thesis. I was thinking for smartphone security or something similar. If you can suggest me any useful topic (smartphone or may be other). Thanks in...

    denialwayne10 pointsBadges:
  • Event View Error Message

    Hi, I just started learning about Exchange Server 2003, and I have no idea what those error (warning) messages are. Most of these messages are the messages I receive everyday. Please look at it and give me some solution. Verify that the Microsoft Exchange MTA service has started. Consecutive...

    AnswerAll0 pointsBadges:
  • Kaspersky Internet security reusability

    I'm using Kaspersky Internet security and only 60 days left on it. I want to format my laptop. Is it possible to use the same security code after formatting my laptop?

    swarnaramya5 pointsBadges:
  • How to protect an Excel sheet from printing?

    How can I protect my Excel sheet from printing so that if anyone tries printing it, they're not able to get a printout?

    Jaideep Khanduja9,165 pointsBadges:
  • Configuring Cisco Wireless Router

    Greetings, I have a Cisco 871 wireless router and am having problems configuring it to act as a Wireless Access Point for my small internal network using Microsoft Small Business Server 2003. I am trying to set up one client access via wireless. Using Cisco’s SDM Express, when trying to change...

    RP@ADF15 pointsBadges:
  • Applying an ACL in Packet Tracer for class

    I'm having a problem figuring out how to configure the following:Allow hosts on the 192.168.30.0/24 network web access to any destination Allow hosts on the 192.168.30.0/24 network ICMP access to any destination. Explicitly deny any other access origination from the network.Now the they say...

    MRLS71815 pointsBadges:
  • ITKE Discussion tool bar

    It's been a few weeks since I had the discussion tool bar. ITKE development can not replicate the problem. Did you experience this problem? How did you resolve it? Thanks Phil 5/7/13 .. added tags that have nothing to do with this task but might get some attention

    philpl1jb50,205 pointsBadges:
  • Blocking user internet access

    Hi, we are currently using a Fortigate 60 Firewall. I need to block user internet access via the firewall. I have been told that this can be done by creating a user group. The users need to be setup with there MAC address and this is what will be used to block the access. My problem is that I'm new...

    Shakeel111125 pointsBadges:
  • Please help me in security

    I have question about public key and private key. If one user sends a message to b, encrypted by public key of b, then how can user b decrypt it using its private key? I mean the public and private key are not different?

    dhaval279235 pointsBadges:
  • What can we do to better protect ourselves from authentication-based attacks?

    According to the 2013 Verizon Data Breach Investigations Report, authentication-based attacks continue to plague enterprises as 80% of all attacks collected by Verizon (and other partners) were authentication-based. Who's to blame for these attacks? Well. Tom Bowers, regional security architect at...

    Michael Tidmarsh30,910 pointsBadges:
  • Security in cloud computing

    I have developed a web site for connecting to cloud and I'm storing my files in the server which I have bought from a cloud provider (actually it is an instance of that cloud). But I want to store the data which is uploaded by the user to be stored in the cloud i.e cloud storage or walrus I have...

    comptechit10 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following