• Interpreting security audit information

    Have switched auditing on for a specific directory in the IFS, information is being collected in the audit journal. Now, how do I actually interpret when a file is deleted? I gleaned I need to look for an LD journal type - when I do a test delete of a file is generates numerous LD types, but I...

    Tinast35 pointsBadges:
  • Data vs. perimeter vs. network security

    A short time ago, author Wes Noonan wrote some tips for SearchWindowsSecurity.com about deperimeterization. He explained how security is always pitted against business needs, and perimeters have become porous because businesses require traffic from SMTP, HTTP or VPNs to pass through the firewall....

    RobynLorusso230 pointsBadges:
  • How to install Windows updates without Open File Security popup

    I deploy Windows updates for new computers with VBScript. With some of the updates Open File Security popup comes up and I can't install the update passively or quietly. How can I do that silently?

    WindowsServerATE335 pointsBadges:
  • Security audit of access within Active Directory 2008 network

    We need to do a security audit to see what users have access to what within our Active Directory 2008 network. Is there a free tool to help with this and possibly reassign permissions based on rules?

    Troubleshooter24755 pointsBadges:
  • Template for creating source code security

    Anyone who has a template in creating a source code security policy? Thanks!

    Arisaquino5 pointsBadges:
  • computer security

    What is a client-side attack and what are its potential effects (impact on confidentiality, integrity, availability) and what methods might be used to get the user to direct a browser to the rogue web server?

    hiwa7110 pointsBadges:
  • SQL 2005 Security to access 2 databases on same server via Stored Procedure

    We are tyring to apply best security practices by only granting EXECUTE security to Stored Procedures connected to a Role and make users members of the role. However the SP needs to access data from another DB on the same server and when trying we receive "SELECT permission was denied on the...

    A00001615 pointsBadges:
  • SSO on the web, 2-factor security

    Looking for a secure authentication and authorization process on WWW - to include federated logon to multiple pages (single sign on behavior) with more security than uid/pwd access - but without issuing a physical device ("something you have")? Some websites are copperating partners - others are...

    Justgottabeaway15 pointsBadges:
  • Has this computer been compromised?

    One of my computers runs a strange set of files that I don't recognize when it boots:bash.exe, curl.exe, uname.exe, sed.exe, rm.exe, tail.exe, cut.exe, awk.exe, cat.exe, chmod.exe, ls.exe, grep.exeI know I haven't uploaded any programs related to these files, so should II be worried about these...

    ITKE352,485 pointsBadges:
  • Does adding other programs to a firewall compromise security?

    I'm using Ubuntu 11.04 as a Firewall in SOHO environment with the thought of installing a GUI on it. Is it true that this would be a mistake because I should not run other applications on a firewall. Why is this the case?I just don't understand why putting a GUI on it would affect the "security" of...

    ITKE352,485 pointsBadges:
  • How to retrieve passwords in Thunderbird via HDD?

    How does Thunderbird 8 store passwords and how does one retrieve them via HDD? I would usually use NirSoft, but it's not compatible with Thunderbird 8.

    ITKE352,485 pointsBadges:
  • Email security: What does “message opened by mailclient” mean?

    I've recently read that a Belgium MP claimed that her email headers were being read during routing. It also said that the headers had this message "message opened by mailclient". What does this message actually mean?

    ITKE352,485 pointsBadges:
  • Shouldn’t a person just RSA-encrypt the entire document?

    After doing some research on Security, I've finally figured out how to verify if an email / document was actually sent by the "sender". Here's the process I've figured out:The sender gives their public RSA key to the recipient.The sender also uses SHA1 to hash the document.Then he uses his private...

    ITKE352,485 pointsBadges:
  • Is there really a security advantage when it comes to spittling a password?

    I've been reading more and more about the LANMAN (LM) hash and I'm having trouble understanding some of the concepts. Is there really any security advantage when it comes to splitting a password, encrypting the two halves separately, and combining the halves to form one hash? Or is it just more of...

    ITKE352,485 pointsBadges:
  • Questions about our single firewall setup

    We are planning to run the following setup: a firewall between our internal zones and the public internet. Each of our trusted zones use a different VLAN with a 3-layered switch while the DMZ zone is on the firewall itself, trunked to a layer 2 switch on the firewall.Would this setup provide...

    ITKE352,485 pointsBadges:
  • Licensing/pricing options around Forefront Client Security

    What are the licensing/pricing options around Forefront Client Security? This question is from the Microsoft Live Chat which took place on July 13th.

    ITKE352,485 pointsBadges:
  • Recording failed login attempts in security log for Windows XP SP3

    Can we record any other information in the security log about a failed log in attempt on a Windows XP SP3 desktop? And if so what other information and how can we get at it?

    NewnanIT1,110 pointsBadges:
  • Security certificate in Outlook 2003 and 2007

    I am Running Outlook 2007/Outlook 2003 on Windows 7/XP sp3 systems with pop mail from non exchange local e-mail server. The mail servers security certificate expired. I created a new self signed certificate and installed new server certificate on the clients, however I am getting certificate...

    GaryCarlisle25 pointsBadges:
  • Security implications surrouding outbound SSH traffic

    The school that my son goes to blocks outbound SSH traffic. The users inside the network can't use Port 22 / trying to make a SSH connection through another port is also blocked. The reason I was given for this was because it's putting the users inside the network at risk and would allow port...

    ITKE352,485 pointsBadges:
  • Security Implementation

    With the recent spate of news stories about the apparent information assurance/security failures that have come to light as a result of the events that transpired between Aaron Bar and Anonymous, I’ve been discussing security program implementation with my classmates at the Universtity of...

    Packetsneaker20 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following