• How will you protect yourself from a cyber attack?

    According to Symantec, cyber crime will become the 'norm' in 2013 as more nations and groups will use cyber tactics to destroy sensitive funds and information. The company anti-virus company believes the top threat will come from hacktivist groups, who will specialize in attacks on individuals and...

    Michael Tidmarsh30,365 pointsBadges:
  • Can an initial program send a pgm message?

    Is it possible for an initial program (CLP), that runs when a user logs in, to send a message to the queue of the initial menu? *PRV, *EXT and *SAME do not work when specified as the PGMQ.

    BritishGent65 pointsBadges:
  • Login for Tiger Ed

    If I forgot my screen name and password for the Tiger Ed. Is there a way I can reset it or find out what it was?

    delivered110 pointsBadges:
  • Changing web server can access back office app through local host but not when it is on DMZ

    We have a Windows 2003 web server, a SQL database, and a Sonic Wall. The existing web server is to be replaced. We can see and log into our back office application on the new server when we are looking at local host but when we put it into the DMZ we cannot log into our database. All the ports that...

    Elziz15 pointsBadges:
  • Backtrack 5

    I used BackTrack to find a wireless web encryption key, the key is found when I enter it and I omitted the :'s it give me unable to get IP address ,although I entered the key using HEX web, so does the key mismatch?

    mkarmi35 pointsBadges:
  • Blue coat question

    Does anyone know what it means if the LED display message "blue coat" is stuck on a Blue coat 400 series. I tried the front panel buttons and they are not responding or changing the LED display message or configurations. I tried holding the left arrow for 5 seconds still nothing. I cant even...

    dselgt5 pointsBadges:
  • How do I install an internet browser on an encrypted virtual drive?

    I created a EVD using Truecrypt.  I opted not to encypt the entire harddrive, as I am a neophyte using this kind of software. I am assuming that in order for my internet browsing to be protected by the encrypted drive, that the browser has to be installed on the encrypted drive.  If that is...

    BobRoberts5 pointsBadges:
  • E-mail spoofing

    E-mail attacks that spoof addresses and attempt to get the recipient to run malicious code are attacks that pose what kind of threat, to which characteristic of data, and in what state?

    hiwa7110 pointsBadges:
  • ISA Error when some users want to visit some sites ISA Server return such type of error/Event ID.12004Error is•Error Code: 502 Proxy Error.

    AOA. Respected all please help me in solving this type of issues. when some users want to visit some sites ISA Server return such type of error/Event ID.12004 Error is •Error Code: 502 Proxy Error. A software error occurred for a Windows Internet extension application that is required for the...

    Muhammad usman125 pointsBadges:
  • IPS Throughput (Urgent)

    How a 5 Gbps throughput IPS can support 2*10Gbps interfaces?

    SamHo10 pointsBadges:
  • Security

    Can someone tell me how you handle user security since it is no longer available in Access 2007 or 2012. I have a database that I need to pick and choose who can edit certain forms.

    bgharrod5 pointsBadges:
  • 48port switch

    Which one is best for functionality of 24port managed switch or 48port managed switch

    Padhu5 pointsBadges:
  • Encryption by Law? If so, what strength or type?

    Should encryption be explicitly proscribed in Data Security and Privacy legislation like the Massachusetts Data Prvacy Law and the White House cybersecurity initiative? If so, what strength or method? Should there be a minimum strength? What do you think? Troy Tate, thanks, are you recommending the...

    SarahCortes30 pointsBadges:
  • Event log on Cisco ASA 5500

    Having issue configuring logging on my ASA 5500.  Just want to log error messages and warnings.  Have tried logging configuration commands below with no luck.  Is there a command I may be overlooking? [strong]logging enable[/strong] [strong]logging buffered[/strong] 4 logging-buffer size (#)

    Sgtosiris20 pointsBadges:
  • Confidential Information Theft

    I suspect a company who is managing my business stealing or at least know private information which they are not supposed to do. Private memo and things. Is there a way for me to detect how they are doing it. Want to catch then red handed.

    rising12510 pointsBadges:
  • Certification

    How do I go about getting Iso 27001 and Soc2 cert for ssae - 16? Are there consultants who can come in plan nd implement the thing for a startup

    penny1250 pointsBadges:
  • Mobile Antivirus

    I want to build an antivirus for android...so I need virus signature database...while surfing through net I could find that Dr. Web deals with android viruses...i downloaded one of its virus database...but its VDB...my system is not recognizing the software with which I can open it...I also tried...

    TKK55 pointsBadges:
  • How do I set it up: Do I use my login or hers

    How do i set it up: From my wife's work to view her computer on our home computer. How do I log into mine or hers.

    Gregtc12310 pointsBadges:
  • ISO 27001 and SSAE -16 compliance

    Hi I am in a startup that has to be ISO27001 and SSAE-16 compliant. I am starting from scratch and more ominously have no idea on what needs to be done and how it can be done, while not breaking the bank.I would greatly appreciate guidance in this matter. Looking forward to hearing from the...

    penny1250 pointsBadges:
  • SSL for AHS (SSO enabled)

    Hi, I created the SSL certificate and I installed successfully for SSO enabled application. but it does not allow me to get inside the application . It says " Authorization required

    santtomcat90 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following