• Which attacks can SIEM detect, but another security product can’t?

    I'm trying to prepare a proposal for a project. I must first find some attacks that security products can't detect and after that by SIEM and customer correlation rules detect them, is there anyone that help me?

    1234567890120 pointsBadges:
  • Firewalls and Network Monitoring Tools

    What are the key key features differentiating network monitoring tools and firewalls/UTMS? If an organization runs cyberoam, for example, do they require a network monitoring tool for bandwidth and other security/network management aspects

    cosangori5 pointsBadges:
  • Linux security: Partition a box

    I recently purchased a new laptop and I'm thinking of installing Kali Linux it so I can learn more about network security. Can I partition a Linux box so it's resistant to any security risks? Thanks!

    ITKE409,490 pointsBadges:
  • Which choice is better for a certificate to be used metadata’s for SSO? Frequently changing or one that remains same over long duration?

    In our SAML SSO Setup, currently we are using tomcat certificate in Service Provider metadata for signing and encryption purpose, but since many CAs are providing certificate validity to be very less (30-60 days), It is getting painful to redo the cumbersome SSO Setup on our huge server cluster,...

    schhonker5 pointsBadges:
  • Network documentation/Diagram

    I am curious as to how others are documenting their network; both visually and configurations. I am familiar with MS Visio for drawing the network. Are there better options? What about documenting all equiptment? IP addresses? Settings? Changes? I am just using MS Excel/word to create all sorts of...

    Skepticals0 pointsBadges:
  • Network Connection Freezes

    For some reason, at random, among 20 PCs on my network, in the morning or during the day, the network connection stops responding for both intranet and internet communications. The only solution thus far is to remove the NIC from the Device Manager, reboot the PC, and let Windows XP Pro find the...

    DboiSOBE0 pointsBadges:
  • Make an url attack by SQL injection to display all data in the database

    Can you help me to make an URL attack by SQL injection to display all data in the database? For example by login form to display all registered users in the database. Thank you.

    noor199530 pointsBadges:
  • Forgot my password on Skype

    I forgot my password for Skype. How can I get it back?

    hollywoodjoan5 pointsBadges:
  • Block websites with Windows 8 firewall

    Can I use my Windows 8 firewall to block several websites? Or do I have to a third-party firewall for this?

    ITKE409,490 pointsBadges:
  • Malware scan of internal storage of Android device

    Can I actually scan all of the content on my Android device's internal storage without damaging it? I'm afraid there's a virus and I'm trying to run a malware scan of the entire storage. Thanks!

    ITKE409,490 pointsBadges:
  • Trojan/Spyware on iPhone 5c

    Can a hacker install a Trojan/spyware virus onto an iPhone 5c if you use it as a personal hotspot for a windows computer, if you visit a bad website and your compute gets the virus will my iPhone 5c also get it as it is the personal hotspot? I'm only talking about Trojans and spyware as I have...

    TomW985 pointsBadges:
  • Does a client machine have to have an IP address during EAP process?

    Does a client machine must have IP address on it before it is authenticated with 802.1x using EAP protocol?

    sqambera35 pointsBadges:
  • My LG10 micro controlled device

    Is there a scan that will tell me if someone is controlling my phone?

    Karma325 pointsBadges:
  • Authentication token error message on Ubuntu server

    On my Ubuntu server when I login with my username and type in the PASSWD command to change my password, I keep getting this error message: passwd: Authentication token manipulation error passwd: password unchanged Am I missing something here? Is there another way to change my password? Currently,...

    ITKE409,490 pointsBadges:
  • How to setup Gmail encryption

    My friend is an accounting for a finance company and he asked me what's the best way to exchange several documents with his clients. I told him the best way to do it was through PGP but he just wants to send emails through Gmail. If there's a way, can he encrypt his emails through Gmail?

    ITKE409,490 pointsBadges:
  • Authentication for Dragon naturally speaking software

    How does a user authenticate themselves to a system?

    TLehmanjn59gmailcom20165 pointsBadges:
  • Who hacked my iPhone and Facebook?

    Is there any way I can see who hacked my phone and Facebook?

    mblanco025 pointsBadges:
  • Was my computer hacked?

    Hi, I have a question. I applied to topica via upwork, had my skype interview, and the interviewer asked me to run a couple of tests to check my internet speed. I want to know if these tests are legit or if he managed to hack my computer? The tests were as follows: First he made me run the run...

    Notsure0015 pointsBadges:
  • Malware using extension .CFG

    My virus scanner isolates files with a .CFG extension. It parks them in a subfile labeled cfgall. I understand this is another name for W97M-ORTANT.A. I can't find anything with that name or W97 anywhere on the affected computer. This computer is running Windows XP. How do I get rid of this?

    Bennycat5 pointsBadges:
  • Open .JS files in my Outlook 2013 inbox

    How can I open .JS files in my Outlook 2013 inbox?

    thart0015 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

Thanks! We'll email you when relevant content is added and updated.

Following