How to disable save as homepage from visitor hack our code?
Answer Question | December 31, 2012 5:30 PM
We have cyberoam firewall at most of the remote end. VPN has been established successfully. There are number of VPNs which are working fine. We had the LAN IP changed at the obne of our remote end.VPN is established successfully but no traffic is getting passed to and fro. Troubleshooting is done at the remote firewall [...]
Answer Question | December 31, 2012 11:22 AM
Firewall, VPN connection
How to unlock computer administrator when it’s locked?
Answer Question | December 31, 2012 4:42 AM
computer security, Security
Where all the places we use Layer 2 and Layer 3 Switches?
Answer Question | December 31, 2012 3:22 PM
Layer 2 switches, Layer 3 switches
What temporary modifications can I make to Windows Firewall on Windows 7 computer that stands between the web server and the internet that would allow legitimate customers to access the web server while blocking a Denial of Service Attack?
Answer Question | December 28, 2012 4:51 PM
DOS Attack, Windows firewall
How to secure my server 2003 client only write & Read permission but client do not delete or copy, move permission?
Answer Question | December 26, 2012 6:55 AM
Halo We purchased a Cisco router 2811 with two Ethernet ports: Fast Ethernet 0/0 and Fast Ethernet 0/1, but without WAN interface cards! How can I configure one of the ports to work as a WAN port and the other to act as LAN port, so as to enable the 2811 router exchange information with [...]
Answer Question | December 20, 2012 12:33 PM
Cisco 2811, Cisco router
I am unable to use SFTP with a ‘get’ on a file that has a date variable in the file name using wildcard characters. I have attempted using an asterik as a wild card for the date and I have tried using question marks for the date characters in the file name. I get the [...]
Answer Question | December 17, 2012 10:42 PM
SFTP, SFTP file
I am a volunteer with a non-profit organization. Part of my proposal entails encrypting and decrypting Personal Identifying Information, its storage on a database, and transfer over the internet. I would like to use or extend software code that improves upon the public-key and private-key paradigm. I have previously written code as a software engineer. [...]
Answer Question | December 13, 2012 12:50 PM
Decryption, Encryption keys
Hi friends…May I know how to make a file read only for everyone expect admin can control it. Thank you.
Answer Question | December 11, 2012 5:40 AM
File permission, File Shares, Network file
What are the commands for finding cvlans and svlans in Juniper device (JunOS). It’s difficult to be specific as my domain knowledge is low.
Answer Question | December 6, 2012 9:45 AM
CVLAN, Juniper, SVLAN
I work for a company that operates under SEC jurisdiction (financial services). We have been told that we can no longer use password protected / encrypted files for “discovery” reasons with the SEC. Is this correct? I email employee compensation and health data all the time as part of my job, and these are not [...]
Answer Question | December 6, 2012 10:00 PM
Microsoft Office, password security, Security
Within the GRC cycle, how can IT security compliance be best described?
Answer Question | December 5, 2012 6:57 PM
Compliance, IT security
I need to find a penetration tester who is certified and qualified. Where do I start to look? Thanks
Answer Question | November 29, 2012 12:48 PM
Penetration Testing, Security
Hi I needed from a person an important email with an attachment (I give the person a fictious name here: Name familyname) . The person sent me the email he sent, and the answer he received. Here is what he sent me (I changed the content but respected the format). I told the person that [...]
Answer Question | November 26, 2012 4:13 PM
Lotus Domino, Lotus Notes 8.5, Security
According to Symantec, cyber crime will become the ‘norm’ in 2013 as more nations and groups will use cyber tactics to destroy sensitive funds and information. The company anti-virus company believes the top threat will come from hacktivist groups, who will specialize in attacks on individuals and non-government organizations. Tell us how you will protect [...]
Answer Question | November 20, 2012 7:48 PM
cybersecurity, Hackers, Security
I have been working on assessing a few leading network equipment vendors in the likes of Cisco, HP, Juniper, etc., to procure Layer 2 switches. I am currently assessing the capabilities of Huawei and i have been hearing about a litigation raised by Nortel (Avaya) against Huawei on their Layer 2 switches, however, I have [...]
Answer Question | November 20, 2012 6:12 PM
Cisco, HP, Huawei, Juniper, Layer 2 switches, Unified Communications, Unified Communications Hardware
We have a Windows 2003 web server, a SQL database, and a Sonic Wall. The existing web server is to be replaced. We can see and log into our back office application on the new server when we are looking at local host but when we put it into the DMZ we cannot log into [...]
Answer Question | November 19, 2012 11:04 AM
DMZ, SQL Database, Windows Web Server 2003
If I forgot my screen name and password for the Tiger Ed. Is there a way I can reset it or find out what it was?
Answer Question | November 19, 2012 1:51 PM
Login, Login password
I used BackTrack to find a wireless web encryption key, the key is found when I enter it and I omitted the :’s it give me unable to get IP address ,although I entered the key using HEX web, so does the key mismatch?
Answer Question | November 15, 2012 11:21 AM
BackTrack, Encryption keys