• How can I connect SDK With C#?

    Could you tell me how to connect SDK with C#?! My SDK is gruail.

    chant18130 pointsBadges:
  • Can Dongle not store any data?

    We're in a restricted office space and if the data storage devices are restricted to be carried at work, can dongle be allowed? Can a dongle not store any data?

    RuchiSabherwal5 pointsBadges:
  • Deleted users audit trails in AS/400

    Scenario 1: I have been doing some cleanup of user profiles that have not logged in more than 365 days to satisfy a SOX Compliance issue. I am doing this across all of our Health facilities (57). IT Personnel from one of the facilities is concerned that they would lose the Audit trail for these...

    DCORDERO4725 pointsBadges:
  • Connect fingerprint machine with own code

    Haw I can connect my own code with the fingerprint machine, my fingerprint machine is (andy) and I add sdk to my code in C#. Please help me.

    chant18130 pointsBadges:
  • Single Sign-on For Multiple Organizations

    I need to implement a kind of single sign-on on my portal to remove the hassle of a customer who otherwise needs to login multiple times for data order. The data products may come from different vendors online directly. Each vendor has its own data web services, which I do not want to touch. I...

    HowSSO5 pointsBadges:
  • Should I use RAID on my backup server?

    I've been setting up a new backup server (using Symantec Backup Exec so that it stores hard disks instead of tape). This is because the size of our backup is outgrowing our tape capacity. But here's my question: Should I use RAID for the backup server? Thank you

    ITKE361,880 pointsBadges:
  • Hacking into my computer

    Hi, Can someone hack your computer and then set up a website to make it look like it's coming from your IP address? My laptop has no security because I never used it for banking so I didn't get any. Thanks!

    Jewels12315 pointsBadges:
  • WebSphere application server patching

    Any useful tips while patching WebSphere application server?

    ranchi9105 pointsBadges:
  • How to test WordPress 4.2 stored XSS vulnerability

    I tried to exploit in my local server but unable to do.

    prernagarg10 pointsBadges:
  • Can someone hack into your computer from somewhere else without having the password and delete your files?

    My computer file disappeared right in front of my face without it being able to be restored when I went back to the computers history when I had the files. There is no trace of my files in the trash or computer.

    Tamika5 pointsBadges:
  • Wi-Fi hacking

    Our neighborhood has a commercial Wi-Fi tower owned privately by a shop. He sells Wi-Fi to earn money. His tower is a medium sized broadcasting tower. Now, I want to ask that is there any way out to hack his Wi-Fi. He said that it needs a antenna (cost Rs. 2000) in order to get Wi-Fi but I already...

    ranaakash5 pointsBadges:
  • Remove security breach listed on security event log

    How do we remove this serious security breach listed on the security event log. Ran several malware programs with no results. Microsoft & network searches Subject logon ID 0x205e6. Then S-1-5-21-2771767311- continuing list continuing with more numbers. Running Windows Vista Home with Norton 360...

    VickiH5 pointsBadges:
  • NAS privacy

    How secure is NAS when you use user accounts and passwords for accessing to the folders but the NAS is not encrypted? (e.g. WD My Cloud DL2100) Can you read data from folders without knowing user name and the password? There is a folder called MyFolder and only Henry has access to that folder. Are...

    vlx20155 pointsBadges:
  • How to connect to BSNL WLAN having security as 802.1x EAP?

    When I try to connect to BSNL WLAN router with my Android, I am asked to give identity and password. However I know the password but unknown about identity. Please help me to solve out my problem.

    dishantkhatri5 pointsBadges:
  • When it comes to cloud services, is security your highest concern?

    In a recent Quocirca study for CA Technologies, it was found that IT security spending was higher among companies who said they were enthusiastic about cloud computing services. But 72% said they lacked the resources required to secure their cloud services. When it comes to cloud services, is...

    Michael Tidmarsh38,570 pointsBadges:
  • Proxy server hack

    My system seems to keep restoring functions I don't want on its own it uninstalled the antivirus over night and I'm getting Weird Proxy server messages and DNS probing errors on my browser's can't load this page message sudden dead signal periods or really slow periods Ping spiking like crazy and...

    Greco3335 pointsBadges:
  • Need Storage encrypted solution

    Hi, I hope you can give me an option to have encrypted data at storage level, preferable SAN but if not possible NAS can be adopted. Must be 256 bit encrypted, this is required for call recording compliance. Thanks in advance.

    Xtornet5 pointsBadges:
  • Is it necessary to implement a proxy to provide Internet output?

    Hi, If I have internet contact on my POS (certain internet IP address), nothing of download. Cellphone recharges, etc. And is behind a firewall, my question is: If have the firewall, is it necessary to implement a proxy in order to provide internet output and still in compliance with PCI?

    IsrBla5 pointsBadges:
  • Live Chat with Alcatel-Lucent on April 7 (Sponsored)

    On April 7, attend our Live Chat with Alcatel-Lucent to discuss real-world examples of service providers implementing transformation projects to become more innovative, competitive, simpler, faster and more efficient; while improving customer quality of experience and laying a solid foundation for...

    ITKE361,880 pointsBadges:
  • What is the best way to implement the security testing on mobile applications?

    I am new to software testing field, and in these starting days of my carrier I got the task to implement the security testing on mobile application i.e., (Android and iOS both). Please tell me the best and the easiest way to implement security testing. Thanks in advance.

    Jitenderbhardwaj5 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following