• about virus

    how viruses attack windows os? why viruses does not attack linus os?

    Sathiiish0 pointsBadges:
  • Can’t delete virus with TrendMicro

    Anyone know i have some problem i can't disinfect virus mal_otorun 1 and EXPL CPLNK.SM im use trendmicro antivirus.....

    STAFFIT110 pointsBadges:
  • anti virus

    can i run more than one anti virus programs

    Samarcq0 pointsBadges:
  • Compressing Old Files

    Hello, I would like to know the option(Compressing Old Files) which comes up during disk cleanup in win XP and win 2000. Is it good or bad? I mean, If I do the compression regularly will that effect my system/files in a long run? Is it same to that option (compress drive to save space) in disk...

    BinooDas123410 pointsBadges:
  • Group Policy to disable portable storage devices

    Hi, I have one question here. Can Ad group policy disable auto reading for external drive for example tumb drive, protable HDD? Please advice. Thanks

    Mfedli5 pointsBadges:
  • Eradicate Virus Remover 2009 on Windows XP

    Eradicating Virus Remover 2009 My computer (Dell with Windows XP) got infected with Virus Remover 2009. It is a pesky virus (malware) & keeps popping up informing that I need to install this software to remove virus from my PC. It shows a scan and informs that a number of files are infected. I have...

    SbElectric2,540 pointsBadges:
  • Cannot open Tally 9.2 data due to virus

    not ble to open tally 9.2 company as there is virus in my data. how to remove the virus

    Saurav72935 pointsBadges:
  • Active Threats

    Are items listed in the active threats on Kaspersky Anti-Virus 2009 still threats?

    DYLDAL15 pointsBadges:
  • Disaster Recovery – when to declare one?

    Has anyone performed a business anlaysis regarding when to activate a DR plan?  If a problem appears to be a memory that can be fixed within 4-5 hours...would you declare a disaster and move to your hot site...or would you attempt to fix the system problem and if issues still exist, then declare...

    Theoutcast5 pointsBadges:
  • Where is the more button? Lotus 8

    I'm trying to add a signature to my outgoing emails. It says go to the more button. I can't find it. So I opened new memo, create, tools, add signature.  Did that part right, (I've done it before) but once I've added it, close the memo, open another one, there is no signature.

    Fmssuser5 pointsBadges:
  • lost password

    lost password for wireless router. would like to find or reset.

    St1redred10 pointsBadges:
  • Granting systems access in a DR situation

    What are some best practices for managing access rights during recovery situations. The question is particularly directed towards additional personnel or vendors that may need access to certain system functions, but only during a DR situation. How is that handled best?

    Alexsar5 pointsBadges:
  • password

    my administrator password is failing when I try to boot my hard drive which crashed.I am trying to chkdsk it but password is failing?How could I possibly bypass it?

    13078010 pointsBadges:
  • Open IT Forum: What cloud concern do you need addressed?

    Will all of the buzz surrounding the cloud - no doubt amplified by Vivek Kundra's push to the cloud - are you feeling left out at all? I recently spoke to an operations manager who feels that SMBs are excluded from the discussion because of fewer resources. What information would you like to know...

    MelanieYarbrough6,345 pointsBadges:
  • Information security frameworks

    Would you give me guide lines on developement steps and initial requirements of information security fraemeworks?

    Saidkhalfan5 pointsBadges:
  • How can one keep data secure with cloud computing

    A large company is working on a new project that requires cloud computing.  If they utilize their private network they can reasonably assume their data to be secure, given that all protocols with remote access are followed or the private network does not allow remote access.

    XENOPHON222,340 pointsBadges:
  • Open IT Forum: What are your cloud security concerns for 2011?

    Everyone has their own reasons for not wanting to experiment in the cloud, but more and more the enterprise is trusting mission critical applications to the cloud. What are your major security concerns for 2011 regarding the cloud, if any? How have those concerns changed or evolved since 2010?...

    MelanieYarbrough6,345 pointsBadges:
  • Weaknesses of Cloud Computing

    I know there is a lot of buzz around cloud computing, but the weaknesses seem to get no press. My greatest concerns are encryption and key management. What are the other downsides you've discovered?

    ITKE352,420 pointsBadges:
  • How to secure the host layer in IaaS?

    I would like to know that the security issues of host layer in IaaS. Thanks and Regards, Yex

    Yexlaynaing15 pointsBadges:
  • Can an IPv6 address be spoofed?

    Can an IPv6 address be spoofed?

    SearchEnterpriseWAN1,085 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following