• what is needed to beacome a ethical hacker

    Hi guys i am interested in ethical hacking i just dont know where to start learning. What is needed to do the job i have been told to learn PHP and python but i need a much more concrete answer or suggestion can anyone point me in the right direction i am willing to go as far as needed i am not a...

    Scribble165 pointsBadges:
  • AVG Free 2011 popup windows throughout the day

    I recently upgraded AVG Free 9 &10 to AVG Free 2011. THe first two installs failed and the third one worked. However, throughout the day, I notice a popup screen asking permission to access my internet connection. The message says "hbf.cloud.avg.com" is wanting to access my internet connection....

    Questioner295 pointsBadges:
  • Tidserv request 2 attack: Virus or malware?

    Norton is giving me a message saying a tidserv request2 was block, is this a virus or malware infection?

    Reggies90 pointsBadges:
  • College For Information Security and Risk Management

    Hi im about to begin my goal in computer information secuirty and risk management....im just curious as to 1) the types of jobs this bachelors would allow me to get 2) what is a starting salary? and 3) what else would you reccomend that i take in the IT Field (school wise) to further excell this...

    O1910 pointsBadges:
  • Track confidential data being input to Windows Domain computers

    information being entered by any domain computer? We want to track confidential information and make sure it is not getting out of the company.

    Karl Gechlik9,860 pointsBadges:
  • Moving FTP to FTPS on iSeries

    A search400 reader wrote in this question: We are in the process of moving from ftp to ftps on our iSeries v5r3. We have an automated cl that does our ftp. I am just trying to find out if moving to ftps will require modification to our current CL. i.e any new parameters that need to be included or...

    Leah Rosin520 pointsBadges:
  • Windows firewall settings via group policy

    Can we push out windows firewall settings via group policy and then lock out the user from modifying or changing the rules in any way? Can administrators get around this?

    NewnanIT1,110 pointsBadges:
  • Scanning Windows XP workstations for known vulnerabilities

    Can we scan Windows XP workstations for known vulnerabilities in the OS or installed applications?

    TeachMeIT975 pointsBadges:
  • Network Management

    As Enterprice network grow larger, management becomes difficult and certain tools and standards are neccesary for good network performance . I need an expert solution for network management in an Enterprise going through a similar scenario .I need help on what and how a system can be established to...

    Ngoube0 pointsBadges:
  • Lotus Notes email security issue regarding forwarding email to gmail account

    Is it possible for to set your lotus notes account to send emails to an outside mailbox automatically (gmail etc)? I recevied a strange message yesterday something to the effect "your forwarded message to your gmail account failed". I don't have a gmail account and am concerned I might have a...

    Um1988885 pointsBadges:
  • Computer access problem on network

    hello, I am facing this problem from many days.the problem is ,when I share some folder on my computer (even with everyone rights) it is not accessible to other computer and display error message "Access denied". I turned off my firewall,create user and assign appropriate rights to user on...

    Thbaig15 pointsBadges:
  • Career Query

    I  have done BSc Computer Science from Mumbai University. What shall i do further which will be beneficial for my future. m thinking of doing MSc I.T.   &  den RedHat certification which  are the RedHat certifications that will prove beneficial for future ?   Mostly m intersted in Network...

    Senvidya5 pointsBadges:
  • Test early without test design/cases. Is this correct in test cycle?

    Hi, I would like to know if anyone has this issue and how to solve it. My test project estimation for each module has been given by Project manager. Each of the testing stage for example test design, test execution, test reporting and retest defects in within a dedicated time. However, most of the...

    maylee5 pointsBadges:
  • Session border controller on VoIP network

    What is a session border controller and do I need one for my new VOIP network? All clients are Windows 7 running off a sonicwall pro 3060 network.

    NewnanIT1,110 pointsBadges:
  • sftp in AS400

    Is sftp available in AS400 with standard configuration? If yes, any steps to set it up?

    TonySW10 pointsBadges:
  • Free IT Book: The Software Developer’s Career Handbook – Being Geek

    This week's free IT book giveaway is Michael Lopp's The Software Developer's Career Handbook: Being Geek. Lopp hasn't written just another career book, he provides his first-hand experiences to advise on how to navigate the job life cycle. Lopp is a Silicon Valley-based engineering manager who's...

    MelanieYarbrough6,345 pointsBadges:
  • Is *JOBCTL needed to view job logs?

    I have read IBM's Security manual and Work Management manual and I know that *JOBCTL is needed to change job priorities and other things for jobs on the system, but I do not see any statements that say *JOBCTL is needed to view the job logs of other user's jobs on the system. Does anyone know if...

    Bkr0963c0 pointsBadges:
  • AS/400 User Profiles

    For auditing purposes, I need to find out what workstation a password was changed on. When you dspusrprf it shows the date it was changed and the date and time last logged. I would assume the workstation information must be there somewhere. Does anyone know how I could find this?

    Sloopy71230 pointsBadges:
  • Observe Windows Users using Windows XP

    We want to observe our domain users desktops without their knowledge. Sort of like a spot check. Randomly checking users for non work related Internet activities and what not. Windows XP SP3 on the desktop running a 2003 AD domain.

    Karl Gechlik9,860 pointsBadges:
  • Password protecting Excel 2010 files

    Can we password protect an Excel 2003 document and what happens if the password is lost? Can it be recovered? If so does this ruin the password protection and illusion of security it provides?

    Karl Gechlik9,860 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following