• How to become a Information security consultant / auditor

    Hi all, I am pretty new to all of this so excuse my ignorance, I have been told by an Information Security Officer That I would be a good consultant, however I am too am confused about how to start or where to start. I know that there are three courses to be a lead auditor but I dont have any...

    JohnStewart25 pointsBadges:
  • Should I install Firesheep on others’ computer?

    Should I install Firesheep on another person's computer??

    pakinam5 pointsBadges:
  • Is it better to use native iOS and Android development or Adobe Air?

    Is it better to invest more money building an Application for iOS and Android in the native way or it worth using AIR for both? I am using a lot of media on the APP, so I want it to be fast.

    cras5165 pointsBadges:
  • Retrieving original MAC address

    Our group is tasked with with retrieving the active MAC address for our Windows PCs. Here's the code we're using: private static string macId() { return identifier("Win32_NetworkAdapterConfiguration", "MACAddress", "IPEnabled"); } private static string identifier(string wmiClass, string...

    ITKE342,985 pointsBadges:
  • Information engineering and cybersecurity

    Is computer and information engineering a part of cybersecurity? If yes tell me why and in which subject please?

    meshaa40 pointsBadges:
  • Certificate enrollment failed – says RPC server unavailable

    I checked my logs in windows 2003 R2 and received the following error: certificate enrollment for local system failed to enroll for one Domain Controller certificate from (SERVER NAME). (RPC server unavailable 0×800706ba (win32: 1722))

    Tis10 pointsBadges:
  • How can I disable Bitdefender Safepay?

    Can I disable Safepay and just keep the Bitdefender Internet Security?

    garig15 pointsBadges:
  • Windows server 2008 disk space problem

    Hi. I have installed Windows 2008 server, and on this platform Forefront firewall. I have a problem: Disk C volume is 30 GB. When I looked up the properties of Disk C, there is 22 GB used space but when I looked up total folders volume on Disk C, all of the volume is 11 GB (Include hidden folders)....

    Eliyevelxan1,235 pointsBadges:
  • What’s the difference between cloud security solutions for ISPs clients and known security program for PC

    What is the difference in performance bet' cloud security solutions for ISP's clients and security program for PCs (like Norton security program for instance)?

    a1b1c1d1e525 pointsBadges:
  • What is the best security framework?

    I am currently a student at UAT and we were directed to this forum with the instructions to post a question about Security Frameworks, so the best question I can have is, What Security Frameworks have any of you personally worked with and which do you feel is better?

    ChadDiehl5 pointsBadges:
  • What is the best way to store usernames and passwords within Android applications?

    Should I approach this through this through the preferences screen or code a dialog box into which users can input their details? Either way, how should I arrange security for the app?

    ITKE342,985 pointsBadges:
  • Ghost imagaing

    Hiya all, Specs first.. Ghost Corporate multicast server 7.5. Switches are all 3com, 10/100. Wireless network is 10mg network ports (2) shared via 2 wirelss access points, (D-Link 22Mbps) Problem is, whenever i image multiple machines, the whole network goes slow. The machines affected are old and...

    Carl0s810 pointsBadges:
  • How can a general user trace the origin of TCP/IP data generated by persistent e-mail anomaly?

    Thank you very much for taking time to consider this question. What do you recommend for a general user who needs to trace the origin and route of TCP/IP data associated with an e-mail message? My SOHO computer is infected by some form of malware. The ISP's tech support could not resolve it; the...

    Troubleshoot201415 pointsBadges:
  • Removing SATA HDD passwords

    Hi, Is there a program that can be used to recover or remove SATA HDD passwords?

    Xxx385 pointsBadges:
  • Help! Hackers keep getting in my computer

    I have been hacked for months and I dont know what to do to keep them out. I am not a expert on the computer but I get what I need done, but I was totally unaware that what has happened to me is possible. I got Kevin's book "Hacking for Dummies" to try & learn some of the things I see.  I am...

    Stevie9265 pointsBadges:
  • What should I do to stop people from hacking or tampering my computer?

    I did a chat in a website with a person. Just after few days after, my computer started showing error certificates. (We had Kaspersky internet security set up in it). After that, my CMOS battery failed. I couldn't use Mozilla Firefox and a lots more has changed. Now what should I do to stop this...

    Kittu15Tamilnadu25 pointsBadges:
  • How do I get started in cyber security?

    I want to know the best way to begin learning about cyber security: Should I start with college? Is information technology the best major to pursue or should I pursue computer science? I've read that a bachelor's or degree isn't necessary for cyber security careers and if this is true, what is the...

    rockodubbz5 pointsBadges:
  • Who is legally liable for information on employee devices?

    If illegal software and images are on a BYOD who is liable. I have been involved in some cases and this involves my background working with police and computer forensics investigations. It is very clear to me that company directors and IT Management and directors have got this very wrong. Look...

    hrmp7775 pointsBadges:
  • What is Port 443? Why do SSL VPNs make use of it?

    I am setting up a Web SSL VPN for remote access across my WAN. Can someone explain why SSL VPNs use Port 443? Can I use any other port?

    SearchEnterpriseWAN1,040 pointsBadges:
  • Bypassing FortiGuard web filter

    I want to know if can we bypass our fortiguard web filter. By any means, I have tried all the different VPN software and proxy sites but it's still not working. Torrent is also blocked. Is there any way to by pass it? Please help.

    faisalahd5 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following