• Program’s Security

    How to restrict modifications done by other users in our program????

    shyedajmal285 pointsBadges:
  • Can’t Decrypt Music Files

    My PC recently crashed. I re-installed Windows (XP) adn it's working fine. However, my music folder was encrypted (It was encrypted before my PC crashed). The Music folder is on an external hard drive. When I try to play a file, it does not work. I tried decrypting the files but that doesn't work...

    CoolGal0071235 pointsBadges:
  • Fortinet Firewall in transparent mode over VLAN Trunk 802.1Q

    We have a fortigate firewall in transparent mode. WAN interface is on VLAN 10 and INTERNAL interface is on VLAN 20. If I connect a server behind VLAN 20 on the switch where the firewall is connected everything works fine. The problem is when I connect to another switch that is getting VLAN 20 over...

    Ccipanama5 pointsBadges:
  • Server Abbreviations

    What is the written word for FTPS, SFTPP, and FTPES

    RitaQ5 pointsBadges:
  • SFTP using port number 10022

    Hi, Can someone please explain me the differene between port number 10022 and 22 for implementing SFTP transfer. Which port is preferrable and why?

    DeepikaR115 pointsBadges:
  • How di I identify hackers accessing my computers?

    messages are sent from my computer in the evening when I am not using it. It is turned off. Emails were sent to presidents in various natinos as well as email stating I have declared bankruptcy, which I have not. I have two separate computer security softwares on my home and office computers....

    Safetynet5 pointsBadges:
  • remote with samsung tablet 10.1

    how does one logon to a network that is behind a sonicwall firewall?

    Sonicguy5 pointsBadges:
  • Is there a way to trace real ip address from linux/apache web server?

    I'm having a serious problem with some evil entity submitting fraudulent credit card transactions through my web site.  They apparently have a database of credit card numbers, along with the 3-4 digit CVS, and have sent 9,000 transactions through my web site (same name, address, all for $25.00)....

    Whimsical1115 pointsBadges:
  • w395

    get a password

    Romel5 pointsBadges:
  • ssid

    what does ssid mean?

    Gscohelan5 pointsBadges:
  • How to be a professional hacker

    Can you tell me how to become a professional hacker? Are there any global certifications for it?

    NetworkingATE1,545 pointsBadges:
  • Free IT Book: Why New Systems Fail

    This week's free IT book is Phil Simon's insider's guide to successful IT projects, Why New Systems Fail. From the back of the book, "Organizations often lack the necessary framework to minimize the chance of system failure before, during, and after beginning IT projects." Get the know-how you need...

    MelanieYarbrough6,345 pointsBadges:
  • Free IT Book: Securing SQL Server by Mrdenny!

    This week's free IT book is especially exciting because it was written by Denny Cherry, who you may know better as mrdenny. He's always providing quality and thoughtful answers, and we're excited to share a whole compilation of his knowledge in Securing SQL Server: Protecting Your Database from...

    MelanieYarbrough6,345 pointsBadges:
  • Active Dir. Web Based Password Reset Tool?

    We run a native 2003 Active Directory. We have many remote users who have an AD account (without an Exchange account). Quite often we get emailed from users who are requesting password resets, or account unlocks (since we have a 5-try account lockout policy in effect on the domain). Obviously,...

    GregNottage0 pointsBadges:
  • I just narrowly avoided getting scammed (corrupted files)

    I got a phone call from people impersonating some kind of tech support company. I was redirected to http://www.ammyy.com where I downloaded an .exe file which granted them remote control of my computer, and they then proceeded to use said program to run a scan for viruses, spyware and corrupt...

    0 pointsBadges:
  • TROJAN DELETION

    I acquired a TROJAN that has become a bit of a problem to get rid. I have tried reformatting my FLASH drive since thats where it originated with no results. It has jumped to my laptop and though it does not seem to be causing a problem i still would like to clear it. I have change virus protection...

    Triton5 pointsBadges:
  • Biometrics

    i have to give a seminar of 20 mins regarding boimetrics, so please help me as in which sub topic in that should i choose. please help me with the link where i can find info also about it.

    Bganupama5 pointsBadges:
  • Win XP Pro SP3 Way Too Slow, after a spyware attack, and already cleaned it!!

    hi, i have a P4 3.0ghz system, with Win XP Pro SP3 & ie7 tht is running very very slow in anything and everything after a spyware attack. even openning a new ie7 browser take 20-sec's... i have P4 3.ghz, 1gb Ram , 80gbHD, PC Cillin IS 08 updated... and got the spyware, and had it removed already...

    Shem1o135 pointsBadges:
  • Windows/Linux virus attack

    I have heard that linux can not be effected by virus but windows get effected by viruses. What is the reason.

    Rugs5 pointsBadges:
  • WindowsXP: TrojanByte.Verify

    I understand about restoring the computer. However, for right now, how do I rid this virus from my computer? Norton finds it, but when I click "remove" it doesn't remove it like it usually does. I'm not sure how to set up firewalls, but I'll find that out later too. Any tips about removing it from...

    Question125 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following