• Implementation of password security and management system using shell script source code?

    I want to know the implementation of password security and management systems using shell script along with the source code.

    Charan265 pointsBadges:
  • PGP inconsistency

    Any chain is as week as its weakest link. So, what is PGP's point of using 2048+ bit key pairs and 100+ character passphrases while using a 256 bit key to encrypt the message?

    Carlindo120 pointsBadges:
  • Admin access for Access Control Salto

    How do I gain admin access for Salto access control?

    DonnVl5 pointsBadges:
  • Design biometric system using VB.NET

    How do I design a biometric system using VB.NET?

    cundie5 pointsBadges:
  • Web project setup

    I am new the Linux servers but will be using CentOS servers. I have a web application that was created in Java using a NoSQL database. This application will give users the ability to create there own drag and drop web sites. Very similar to , Web.com, wixs.com, suarespace.com and weekly.com. We...

    sstepky60 pointsBadges:
  • Lotus Notes: Restrict users to change received or sent mails

    I'm no administrator, but want to know if it's been possible to restrict Lotus Notes (Mail) users to change or alter received or sent mails. It should been impossible to alter these mails after sent or received. Nevertheless it should been possible to delete them. Background: We'd like to archive...

    notesrights5 pointsBadges:
  • Cannot find my password in my Gmail account

    I tried to find my password but it was too hard. Can you help me?

    zaekira1575 pointsBadges:
  • Why can’t I set a fingerprint in Windows 10?

    Hi - until recently a user in our domain could access her laptop running Windows 10 by using the fingerprint swipe under the 'Hello' options. Her domain password changed yesterday, so I removed all registered fingerprints from the laptop and registered her finger again from scratch. We tried to...

    nix10304520 pointsBadges:
  • Contingency plannning

    What is a the high-level plan for handling contingencies?

    Shomwele5 pointsBadges:
  • Allow regular user to unlock screensaver locked computer

    We have the problem that in a multiuser environment users either lock their computers, or have the screensaver automatically lock it, and leave the workstation. As a result, nobody else can use that computer. By default, only the current user or an adminstrator can unlock the computer. I would like...

    AdminGurl0 pointsBadges:
  • Best way to secure a tablet

    I'll get straight to my point! What is the best way to secure my tablet? Security, internet, video conference.

    Silumtau5 pointsBadges:
  • Hacked Android Galaxy Phone & Verizon Ellipsis 8

    I believe that I've been experiencing targeted bullying and hacking for the past year. I believe that a laptop and another computer may have had a keylogger installed that seems to have avoided detection by AVG and Malwarebytes updates/scans. On my Android Galaxy phone I installed an app that...

    GlowBug655 pointsBadges:
  • Applying packet switching and binary systems to user accounts

    If you applied packet switching and binary systems to user accounts and content upload, what do you think would happen?

    Wyrdom30 pointsBadges:
  • Clear emails after allowing a spoof

    How do I clear my emails after inadvertently allowing a spoof?

    baylee35 pointsBadges:
  • Creating a DMZ for remote desktop

    I'm working on a project where I need to create a DMZ for remote desktop access. Unfortunately, I was not in on the planning and can't order any hardware or software that wasn't already purchased. I was able to convince the team to use a dual firewall DMZ but they purchased two ASA 5515-x instead...

    JAliCO5 pointsBadges:
  • Crack a .c file password using gdb

    How do I crack a .C file password using GDB?

    Anhdat25 pointsBadges:
  • Can ECC be an alternative to RSA algorithm?

    ECC is much stronger algorithm than RSA, but still RSA is widely used public key algorithm. What are the issues that are in front of ECC to become commercialized?

    kaushalChavan15 pointsBadges:
  • Why should I use a cloud antivirus for my PC?

    What is the difference between antivirus and cloud antivirus. Why should I use a cloud antivirus for my PC?

    matthewsstacey30 pointsBadges:
  • How to become ISO 27002 compliant

    We are being asked by a key customer to be ISO 27002 compliant. We have already provided all of the items to them related to 27002 including SSO enabled, Security Test and IDM. We need to turn a certification quickly - what is the scope and timing and cost of such audit?

    steveragan5 pointsBadges:
  • How can I keep a Windows folder from being moved accidentally

    Is it possible to lock down the folders (or directories) within Windows, so they can't be accidentally dragged and dropped into some unknown location? With multiple users using the same files, we are finding that the Windows folders are disappearing. I was wondering if there is a way of locking the...

    Jbercsik5 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

Thanks! We'll email you when relevant content is added and updated.

Following