How to restore iOS Cisco router 2800 card reader?
Answer Question | October 9, 2012 11:33 AM
Cisco 2800, Cisco router
I am part of a start up that is creating apps that use “geofencing” to authenticate a user. The app is only supposed to work if the user is within a specific geofence. The problem we’re foreseeing is that jailbroken phones will be able to trick the app / phone into thinking it’s somewhere that [...]
Answer Question | October 2, 2012 6:42 AM
I was told by a tech support person that if I type netstat and get anything that says localhost I have been hacked. Is this true? I hadn’t seen it for a couple weeks after they cleaned up the hacking, but it’s back tonight (and everything is REALLY slow tonight). And once tonight, in the [...]
Answer Question | October 1, 2012 2:56 AM
Hacking, Localhost, Netstat
I have a pop-up reminder that I need to know if it’s a virus/malware or something else. Can i send a screen shot?
Answer Question | September 20, 2012 2:11 PM
malware, Security, Viruses
Hi All Could you suggest me an free application download where I can save my passwords in that application and that I do not want to remember. Something like Tam-Esso (tam single sign-on). The above is offered by IBM, an excellent application where I use my system login to login Tam and can login to [...]
Answer Question | September 19, 2012 7:12 PM
Password and ID management
What are some indicators that your PC (XP) has been/is being hacked. EX: I was surfing (MozFire) and the browser seemed to freeze momentarily. I closed and reopened, but when I ended my session I noticed my PC clock had frozen for an hour, I started session at 11:10. I ended at 1:05 but the [...]
Answer Question | September 17, 2012 11:03 PM
Hi One of my client received a failure notice. “Remote host said: 550 Requested action not taken: mailbox unavailable or Anti-spam Action” I already put their email add in whitelist but still cannot send email until i delete the anti-spam in my firewall Juniper SSG-350M. Anyone knows how can i solved this problem without deleting [...]
Answer Question | September 13, 2012 6:50 AM
Firewall, Juniper, Mail server
If I have 5 link between 2 Switch and I Use Etherchanel, Which port Is select To Send The Frame? Or We have & or 6 link?
Answer Question | September 12, 2012 7:06 PM
I’m trying to setup my own dropbox system (for private use). I know what I want, but I don’t know how I can make it work. I’m ‘comfortable’ with some technical things, but I’m no tech-genius, so setting up linux servers etc. is not something I can do Would be lovely if you could help [...]
Answer Question | September 12, 2012 4:25 PM
Access Rights, Dropbox, External hard drives, Storage
Yesterday, hosting company GoDaddy went down for several hours, affecting any number of websites. Did you experience any issues? How did you cope?
Answer Question | September 11, 2012 1:48 PM
Hackers, Website maintenance
From online banking to email accounts, passwords have become a very important part of our everyday lives. This week, we posted an infographic that shows how passwords are at greater risk than ever before. How are you protecting yourself from a password attack?
Answer Question | September 10, 2012 5:39 PM
cybersecurity, Password management
Dear all . How can I block Tor Browser through ISA server 2006 or Websense 7.1? Does anyone have any ideas? Thanks
Answer Question | September 5, 2012 8:14 AM
ISA Server 2006, Websense 7.1
Hello everybody… I am not a guru in Linux or Unix, but, I have a fair knowledge on some of them to some extent… I am still trying and hope to become like some of you in future. Anyway, I have been employed in a new company as their network engineer. They have a mail [...]
Answer Question | September 4, 2012 9:35 AM
CA, Mail server, Postfix, SMTP
I am responsible for the Security Awareness program and I’m trying to put together my IRS Security Awareness training. I work for a government agency and we have to have annual training for security FTI (federal tax information) data, which is required by the IRS. I am looking for a video that we can distribute [...]
Answer Question | August 30, 2012 3:25 PM
FTI, IRS, security awareness training
Hello I have a java application which sniff the network traffic, I am using jpcap and winpcap in my application. Application runs fine with AVG antivirus.but when i did deploy my java application at customer environment where customer has ArcSight Antivirus. At that customer end ArcSight is repotting my Java Application as high risk thread [...]
Answer Question | August 30, 2012 6:39 AM
Dear team, We are connecting our I-Series machine V5.4 with a Linux server using SFTP but the port enabled in the Linux server is 586, non the port 22. Please can you tell us what is the format for the instruction in a batch mode in order to use the port 586 instead the port [...]
Answer Question | August 29, 2012 4:55 PM
i need someone to help me make an application policy ????
Answer Question | August 27, 2012 5:33 AM
how can remove virus from computer .
Answer Question | August 26, 2012 11:57 AM
I’m new in the software security field; I have been drag to a team which reads a report created by software (NESSUS) which identifies vulnerabilities in our servers and workstations. It is pretty much a reactive effort versus a proactive one. My role consists finding the causes of the vulnerability item, by using abstract articles [...]
Answer Question | August 22, 2012 6:05 PM
Is there any way to track “User Account” information on a DB2 server specifically when a users account is locked?
Answer Question | August 22, 2012 3:57 PM
AS/400, audit, DB2, logging, Security