• WAN connections through one ISP

    Hi, I have newly joined an AUTOMOBILE company as an IT supervisor. We have about 10 branches connected with each other thru different WAN connections (Leased line,MPLS,VPN over DSL,..etc) and with different service providers. Our ERP system is based in Head Office and the DMS (Dealer management...

    Nmas5 pointsBadges:
  • What do you foresee as your biggest security concerns in the upcoming year?

    As you begin planning for next year's department spending and resource allocation, what do you foresee as your biggest areas of security concern in the upcoming year? Do you think particular areas will require special attention or resources?

    JennyMack4,280 pointsBadges:
  • Conduct risk assessment on PCs and networks

    I want to how to conduct a risk assessment to protect our PCs and networks.

    M20085 pointsBadges:
  • Where can I find info on recent malware updates?

    Where can I find info on recent malware updates? This question is from the Microsoft Live Chat which took place on July 13th.

    ITKE353,415 pointsBadges:
  • Update/patch operating system

    How do I update/patch the OS and/or some of the programs I have installed to get rid of ‘active’ threats?

    DYLDAL15 pointsBadges:
  • How do I securely store a life-long access token?

    Does anyone know what security measures I should put in place to ensure that if my database was compromised, that my long-life access tokens wouldn't be stolen. Ideally, I would like to encrypt them but I'm not sure how I should do this (particularly when it comes to an open source project).

    ITKE353,415 pointsBadges:
  • Keystroke Logger History

    Is there any way possible to obtain the key code/password that the administer of a keystroke logger would have set when he/she downloaded the logger?

    beliza5560 pointsBadges:
  • PCI Compliance

    Are customer service reps allowed to give out the last 4 digits of a cc used for payment on an account? Or are they only allowed to confirm the information if the customer provides the last 4? If this is a thing, then what law/regulation is it in?

    Asmo155 pointsBadges:
  • How do I generate a secure token for a mobile app to protect its data?

    I recently developed a back end REST API for my mobile application and now I'm looking to implement token-based authentication so I avoid having the user to login every run on the application. My first thought was using basic authentication over SSL. So once the user sends the credentials through...

    ITKE353,415 pointsBadges:
  • ForgeRock Identity Management vs. WSO2 Identity Server: Which is the better open-source IAM solution?

    For the past few weeks, I'm trying to choose one of the Forgerock Identity Management solution and WSO2 Identity server for my IAM solution. These are the features I'm particularly interested in: SSO Policy based access control User identity management Both of these look good but I'm not sure which...

    ITKE353,415 pointsBadges:
  • Can I integrate ReCAPTCHA with Microsoft Forefront Identity Manager?

    Recently at my job, I've been asked to adding a ReCAPTCHA field to our self-service password reset page that's provided by Microsoft's Forefront Identity Manager. But I'm not too knowledgeable about ASP. I've added the ReCAPTCHA control and it is communicating with Google to refresh the page. But...

    ITKE353,415 pointsBadges:
  • What is the difference between RSA and DSA keys?

    I've been generating SSH authentication keys on our Linux/Unix system using ssh-keygen I've been given the choice of creating a RSA of DSA key pair (using -t type). Does anyone know the difference between RSA and DSA keys? Why should I choose one over the other?

    ITKE353,415 pointsBadges:
  • PCI 6.6 requirment

    Which solution can fill the PCI 6.6 requirement?

    Shuli5 pointsBadges:
  • Setting up file authentication in Oracle 9i

    How can we set up a file authentication in Oracle 9i?

    989986944515 pointsBadges:
  • How to brute force attack a password prompt that pops up in my software

    How can I brute force attack a password prompt that pops up in a software program that is being ran on my computer desktop?

    MikeStover5 pointsBadges:
  • How to customize Plone login for two-factor authentication

    I'm pretty new to Plone and Python but I need to customize an existing plone installation login to include two-factor authentication from Duo-Security. Does anyone know the best way to do this? Would there be a Python API for this?

    ITKE353,415 pointsBadges:
  • What is the standard for advance encryption?

    What is the advance encryption standard?

    ANIXILIN1235 pointsBadges:
  • Examine and analyze a digital signature

    How do I examine and analyze a digital signature?

    holsen5 pointsBadges:
  • Best way to scan a server

    What's the best way to scan a server?

    Tahir5665 pointsBadges:
  • How do I create a Windows 8 profile for shared key authentication?

    I've noticed that my Windows 8 won't let me connect to a wireless network that uses WEP with shared-key authentication. I ran Windows 8's network diagnostics wizard and it shows that one exists. The wireless network that you are trying to connect to requires shared-key authentication, a low...

    ITKE353,415 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following