I created a EVD using Truecrypt. I opted not to encypt the entire harddrive, as I am a neophyte using this kind of software. I am assuming that in order for my internet browsing to be protected by the encrypted drive, that the browser has to be installed on the encrypted drive. If that is [...]
Answer Question | November 12, 2012 5:50 PM
Encryption Software, TrueCrypt
What is a client-side attack and what are its potential effects (impact on confidentiality, integrity, availability) and what methods might be used to get the user to direct a browser to the rogue web server?
Answer Question | November 12, 2012 12:14 PM
Security, Security management
E-mail attacks that spoof addresses and attempt to get the recipient to run malicious code are attacks that pose what kind of threat, to which characteristic of data, and in what state?
Answer Question | November 12, 2012 12:11 PM
Email security, Security
Can someone tell me how you handle user security since it is no longer available in Access 2007 or 2012. I have a database that I need to pick and choose who can edit certain forms.
Answer Question | November 9, 2012 6:09 PM
Microsoft Access 2007, Microsoft Access 2012, Security
I suspect a company who is managing my business stealing or at least know private information which they are not supposed to do. Private memo and things. Is there a way for me to detect how they are doing it. Want to catch then red handed.
Answer Question | November 8, 2012 5:23 AM
Security, Security management
How do I go about getting Iso 27001 and Soc2 cert for ssae – 16? Are there consultants who can come in plan nd implement the thing for a startup
Answer Question | November 8, 2012 4:27 AM
Security accessment, Security certifications
I want to build an antivirus for android…so I need virus signature database…while surfing through net I could find that Dr. Web deals with android viruses…i downloaded one of its virus database…but its VDB…my system is not recognizing the software with which I can open it…I also tried using FileCure and it says .VDB file [...]
Answer Question | November 7, 2012 5:41 PM
.VDB files, Antivirus, Mobile
I am using CISCO router WRT120N in my Internet Cafe. Now I have a plan to increase the number of computers to 50 PCs. Is my router WRT120N still effective? Note: I don’t provide Wifi for clients.
Answer Question | October 29, 2012 6:15 AM
Cisco router, Cisco router configuration
Hi, I created the SSL certificate and I installed successfully for SSO enabled application. but it does not allow me to get inside the application . It says ” Authorization required
Answer Question | October 26, 2012 5:33 AM
SSL certificate, SSO
According to a recent study by Ovum, 80% of corporate BYOD programs are ‘inadequately managed by IT departments.’ As more companies allow their staff to use their own computing devices to do work, they’re struggling to address the programs that enable corporate control and guidance. How is your company controlling BYOD? Are they mitigating the [...]
Answer Question | October 26, 2012 6:57 PM
BYOD, Consumerization, Security
I need to apply a security issue in mobile Ad Hoc network using IPSec and I need to simulate it using NS 2 simulator. If any one can help me, I say G bless you. Your brother, Daniel.
Answer Question | October 24, 2012 2:26 PM
Ad Hoc, IPsec
What are two ploys phishers commonly use?
Answer Question | October 23, 2012 12:18 AM
Hi,this weekend i updated the server with sp1 and know i am having problems with the client computers and users when trying to log on the domain. It looks like an DNS problem but i am not sure. I run the DCdiag /test:DNS utility with this results. C:WINDOWSServicePackFilesi386>dcdiag /test:DNS Domain Controller Diagnosis Performing initial setup: [...]
Answer Question | October 22, 2012 12:20 PM
DNS, Domain Controller, Logon failure, Small Business Server 2003, Windows Small Business Server 2003
hi, i created the certificate(hrac.crt) and ca (server-ca)also. how to import the ssl certificate in tomcat web server. please note i dont want the process for self signed certificate
Answer Question | October 21, 2012 4:54 AM
SSL, SSL Certificates, ssl certificates for tomcat, Tomcat
How do i log in new screen name on a used computer?
Answer Question | October 21, 2012 10:26 PM
Login error, Login password, Tiger
SFTP software iSeries Windows Server?
Answer Question | October 22, 2012 7:17 PM
SFTP, SFTP ISERIES
I have always problem wih sophos.
Answer Question | October 19, 2012 5:48 PM
Anti-malware, Antivirus, Sophos
Kaspersky Labs recently confirmed rumors that it is building an operating system aimed exclusively at protecting industrial systems from malware. Think it will be a success? What issues do you see with the company’s approach?
Answer Question | October 16, 2012 7:26 PM
Kaspersky, malware, Security
Hello, I am a student at University of Advancing Technology in the BS network security program and have been assigned to ask a question on a one of the security frameworks we are studying. My question is to anyone who has implemented the ISO 27000 family of security frameworks what was your experience on beginning [...]
Answer Question | October 15, 2012 12:17 AM
Implementation, ISO 27001
Good Morning EveryBody; we are trying to make a new application policy in our company..(Background- we have a number of people here who make small to medium application to meet our needs and requirenmnet)BUT they do not follow standrads and guidelines…i mean they do not have even application policy/templatelguideline;;; i have an empty POLICY,which can [...]
Answer Question | October 10, 2012 4:34 AM