• Should we go ahead with encrypted backups?

    I'm in charge of our department's laptops and now I need to get some sort of automated remote backups started. They would be going to a RAID drive. But the thing is that we don't have a secure vault to hold all of the drives. After talking to my boss, we thought about using some encryption process....

    ITKE364,025 pointsBadges:
  • Recover Skype password

    I forgot my Skype password. How can I recover it?

    sylvanna5 pointsBadges:
  • How to trace and prove who’s hacked my phone

    My phone was somehow accessed by a woman I met asking me to buy my used generator. She then used info from there to hack into my laptop, which uses a Wi-Fi router to get on line. She then began using my bank card to pay her bills, etc. Last year I finally changed my phone # (she was able to turn...

    ImSoConfused15 pointsBadges:
  • How should we backup 20 TB of data?

    At our organization, we have a NAS server that is being used to store photography sessions. Each one has over 100 GB. Each year, it's accumulating 10 TB of data and it's going to keep on growing. We have been backing all this up using tape (LTO-5 tapes with Symantec BackupExec). Since the size...

    ITKE364,025 pointsBadges:
  • Cisco ASA 5505 firewall configuration

    I configured Cisco ASA 5505 firewall configuration. But when I power off firewall, entire configuration is erased. What is the reason?

    HarishG135 pointsBadges:
  • VPN over dynamic IP address

    I want to host my source code control environment (SVN) on a server at home, accessible through VPN. I have a dynamic IP address. Does anyone have suggestions for hardware (router/servers) and software. Looking to keep a low expense, but something that will get the job done well. I have a Linksys...

    ITKE364,025 pointsBadges:
  • Authentication and authorization issues in e-Commerce

    What are the issues facing authentication and authorization in e-Commerce?

    Mashael19925 pointsBadges:
  • How logjam vulnerability can be tested on IPS?

    Logjam is a vulnerability, Which is related to Diffi-Hellman algorithm, I want to test this vulnerability on IPS, One thing I know is that we are using RSA certificate. So I think we are not vulnerable to this, need to verify it with tool or proper steps. Thank you in advance.

    Janakiram15 pointsBadges:
  • Prevent data leakage via free email accounts

    Is there any way other than Rights management to prevent employees from sending confidential files using free email accounts (Yahoo, Google, etc). I can't disable access to all known free email accounts. There are just too many of them. We already use endpoint security to lock down USB drives.

    Xfpgas0 pointsBadges:
  • What are the general threats of cybersecurity?

    In cybersecurity, what are the general threats and counter measures?

    farhat5 pointsBadges:
  • Security features of a videoconferencing system

    Can anyone explain the security features behind a video conferencing system?

    sybile125 pointsBadges:
  • Service of cybersecurity for a company

    What's the service of cybersecurity for a company?

    nazmabd5 pointsBadges:
  • With Windows Update not working (Win7), will the PC be secure using Malwarebytes & Trend Micro AV?

    I have spent about 30 hours trying every Microsoft & 3rd party remedy for loss of Windows Update about 4 months ago. Since I have the premium (paid) versions of Trend and Malwarebytes, it seems I would be safe from security breaches - is this true?

    underH2Odan25 pointsBadges:
  • Someone hacked my computer again

    A few week back I fell into a trap of, "Your computer has been hit with a Virus and we can help you. I was trying to transfer my email from MSN.com to gmail.com. By the time I got done with them $$$$ later. I had to figure it out myself and now have both e-mails, but I only want one and these...

    pauldocrutter5 pointsBadges:
  • iSeries SFTP

    How do you setup for secured FTP? Can the process be automated like normal FTP?

    Mitchb145 pointsBadges:
  • Co-Worker hacking protection

    How can I protect my desktop (especially files and mail) from co-worker hacking? I am sure someone else within the company I work for, is hacking my PC. What can I do to protect my PC, before telling IT?

    GreekStefan35 pointsBadges:
  • How do you scale B to B database and application servers on AWS?

    I am working with a company that is business to business.  The businesses that are our customers are very concerned about their data.  They want to make sure they have max security. I am wondering if it is practical to have a separate application server and separate database for each business....

    jgon915 pointsBadges:
  • Netserver expert anyone?

    I'm trying to access windows folders on a server and I get this error: 'Error exchanging security information... Error Class:1, Code: 5 = Access denied. My passwords do match and I previously accesses these folders. The problem started when I changed my password.

    yaazhisai255 pointsBadges:
  • Techologies used in biometrics

    What are technologies used to develop a biometric application? Is Java is enough or are other languages needed?

    Manjunathhoigegudde15 pointsBadges:
  • How do you know if your computer has been hacked into?

    I have a few error messages coming up on my laptop screen saying someone is trying to hack into your computer. I thought it was just a virus. Does anyone know if it was a virus or was someone really trying to hack in?

    Verynew20 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following