• Please help me in security

    I have question about public key and private key. If one user sends a message to b, encrypted by public key of b, then how can user b decrypt it using its private key? I mean the public and private key are not different?

    dhaval279235 pointsBadges:
  • What can we do to better protect ourselves from authentication-based attacks?

    According to the 2013 Verizon Data Breach Investigations Report, authentication-based attacks continue to plague enterprises as 80% of all attacks collected by Verizon (and other partners) were authentication-based. Who's to blame for these attacks? Well. Tom Bowers, regional security architect at...

    Michael Tidmarsh30,970 pointsBadges:
  • Security in cloud computing

    I have developed a web site for connecting to cloud and I'm storing my files in the server which I have bought from a cloud provider (actually it is an instance of that cloud). But I want to store the data which is uploaded by the user to be stored in the cloud i.e cloud storage or walrus I have...

    comptechit10 pointsBadges:
  • Differences between firewalls and routers

    What are the differences among firewalls and routers.

    yans112112290 pointsBadges:
  • What’s the one network security tool that you can’t live without?

    With security breaches becoming more frequent, expert Michael Gregg looks at network security tools that no tester should be without. We would like to know....what's the one network security tool that you can't live without?

    Michael Tidmarsh30,970 pointsBadges:
  • Android app game hacking

    Ok I really need to know how this person is able to find out my information while I'm in an android game app in the games lobby. Any help would be greatly appreciated. I'm not the only one that this person has gotten personal info from on this app. Help!

    needtoknow1030 pointsBadges:
  • Please help in hacking?

    I have to do disclouser attack using Java...can I do it? If yes, then please help. How can I do it because I am studing about security and I know what is happening in disclouser attack but I have to practically know it.

    dhaval279235 pointsBadges:
  • Computer misuse

    I was wondering if you could answer this question for me. I was given access to the HPI system (checks finance on vehicles) over 8 years ago through my employer. I thought this service was a free service as we are in the transport industry. I did 3 personal checks on this system (bearing in mind...

    marieg3935 pointsBadges:
  • How to apply group policy to a local security group.

    I want to use Local Group Policy Editor to apply group policy to a specific custom security group created using local users and groups snapin for MMC. Is this possible and if so how? If not, than what is the purpose of being to add local security groups. Custom groups do not appear to show up in...

    Falerin5 pointsBadges:
  • Renewal of SSL certificate on AS/400

    Hi, I have renewed the SSL certificate of my iSeries system. While renewing certificate, I haven't got any option to specify the number of days to renew the certificate. It is getting renewed for 1 year by default. How to increase these number of days for SSL certificate while renewing it. Thanks...

    Ketan19305 pointsBadges:
  • Making sense of the SSL certification process

    The SSL certification process seems unnecessarily convoluted. How do you cut through the red tape when you need to get a new cert/re-certification?What resources are available to make sense of the process?

    Chris Leonard4,300 pointsBadges:
  • Card reader vs text recognition

    Is there a difference between these two? My developer is telling me that I have to buy a card reader in order to take a picture of a business card and manually pull out the information. My question is: 1) Is there a good card reader available for free for iOS and Android developers? and: 2) Do I...

    Notechdeveloper10 pointsBadges:
  • SFTP

    I need to transfer a file using SFTP. It's a PF with a 180 character field. When I try the put command from an iSeries library, the file goes over as binary. If I copy it to the IFS and transfer from there, it goes over as text. But, I cannot have this unencrypted file in the IFS, even temporarily....

    CandyS30 pointsBadges:
  • How to port forward and map IP on SonicWALL TZ 180?

    Currently on my company we are trying to configure our Sonic firewall to map an external IP to internal with a port open. This is for our security cameras setup in which we are trying to view them from another network. Can some one help me please I need to get this done ASAP. Our Sonic firewall is...

    Ricardo5736590 pointsBadges:
  • Count distinct rows on multiple columns

    I want to write a single query that counts each distinct Student ID from the following sample data. Sample Data: ID NAME PLAN DESCR --- ------- ---- ------------------- 101 Michael 010C Cafe- 10.00 Dollars 102 Adam 010C Cafe- 10.00 Dollars 102 Adam 05CC Cafe- 5.00 Dollars 103 Jane 010C Cafe- 10.00...

    Mjackson0 pointsBadges:
  • How does IPSec Passthrough enable packet transfer through a router?

    I have configured a remote access IPSec VPN with UDP encapsulation enabled which passes through a broadband router which in turn has IPSEC Passthrough enabled. The remote access tunnel works fine with the IPSEC Passthrough enabled. However, if the Passthrough option is disabled the tunnel is not...

    NetworkingATE1,545 pointsBadges:
  • Need to create a bootable server 2003 CD

    Hello, I have a burned copy of Server 2003 Enterprise edition that a friend gave to me. I'd like to install it on my test server, but am unable to because the CD is not bootable. I have tried booting the server with a 98SE floppy boot disk but am unable to run setup through DOS. I currently have a...

    Kfettig5 pointsBadges:
  • Cisco IPsec VPN: VPN up but no traffic/ping

    Hi, I'm having some problems setting up an IPsec VPN between a Cisco 851 and a Draytek Vigor 2200E+. The IPsec VPN seems to establish well, passes IPsec phase 2, and shows up as an active IPsec session in both routers. The problem is that I'm unable to ping, or send any traffic, to any of the hosts...

    Synesthesia5 pointsBadges:
  • Kaspersky Internet security 2012 update issue

    I am having update issues in Kaspersky internet security 2012. My update starts and it quickly reaches to 15%, download size=142kb but then it stops at 15% for half an hour and finally the messages arrives that network connection has timed out. This is only happening with Kaspersky product. My...

    Vivek275 pointsBadges:
  • Receiving undeliverable email we did not send

    Hi everyone, One of our users keeps getting undeliverable email messages. It looks like someone out there is sending mail and making it look like it is coming from him. Is there anyway to stop this? We are running Exchange 2007. I don't think it is relaying or a virus. It does this even when his PC...

    Fuddstud0 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following