• Free IT Book: CompTIA Security+ Certification Passport

    This week's free IT book is Mike Meyers' CompTIA Security+ Certification Passport: Revised for the new CompTIA Security+ exam (SY0-301). The new edition provides a condensed and concise review of CompTIA’s well-established security credential. For a chance to win this quick review, cram-style...

    MelanieYarbrough6,345 pointsBadges:
  • Bypassing Cisco Iron Port

    How do I bypass Cisco iron port web filtering using proxy setting and port numbers?

    Mubs110 pointsBadges:
  • Road to become a Security Auditor?

    Hi, I am really confused about way to follow to become a Security Auditor... and the opportunities it has in future.. esp. in India? Currently I am working as a Security Consultant but dealing only with Security Related products including Firewalls, NMS, IPS etc and not Standards like BS7799,...

    Ind5 pointsBadges:
  • Exporting Windows server 2003 SAM database for external security audit

    We need to export the windows server 2003 SAM database to a standalone server for an external security audit. Where do I find this file or how can I export the data needed?

    NewnanIT1,110 pointsBadges:
  • Security/ Audit Check list for DB2

    Hi, I'm in the process of hardening the DB2 in Linux and I'm looking for a checklist to help me make sure I don't miss anypoint. Since I'm not an expert on DB2 I would like to have a starting point. I'm looking to make sure I don't leave open doors and also I want ot make sure I don't get an Audit...

    Josec990 pointsBadges:
  • Application data security versus network security

    What are the pros and cons of application data security versus network security? Which do you recommend devoting more budget funds to?

    NewnanIT1,110 pointsBadges:
  • Free IT Book: The Accidental Administrator: Cisco ASA Security Appliance

    This week's free IT book comes with a bonus interview with the author, Don Crawley! Check out what he has to say about the book, the process, and the joys of being an IT-type personality. Then answer one of the questions below and post the link to your answer in the discussion section for your...

    MelanieYarbrough6,345 pointsBadges:
  • Checklists for Router, Firewall and Switch security

    I have recently been shifted to Information security audit department. I need some checklists to check the security compliance for Router, Switch, and Firewall. Please provide me some checklists to audit the same.

    ISMS130 pointsBadges:
  • Cannot Ping Public IP from ISA server 2006

    Dear I am unable to Ping the Public IP over the Internet, My, Client is Behind ISA, ISA disallow to PING the Public IP on internet I want to enable but cannot done in ISA server 2006 E.E. I already add the ICMP and PING protocol in my Array

    Quakerquakest110 pointsBadges:
  • Access Proxy Serve in win2003 server

    Hi this firoj, i want to know how to user proxy server in win2003 server for internet . Becouse if same proxy server ip i put in any client system then internet is working fine .But through same proxy server ip is not working in win 2003 server. i need to run any services in that system or i need...

    File10 pointsBadges:
  • Are password-protected Zip files really safe?

    I have some worry about password-protected Zip files. From what I understand, even though a Zip file is password protected, you can still access it to look at the files on it and their types. This being the case, how secure is such a file, really? It's not a stretch to think that someone could...

    ITKE62,460 pointsBadges:
  • Are BYOD programs a security risk?

    According to a recent study by Ovum, 80% of corporate BYOD programs are 'inadequately managed by IT departments.' As more companies allow their staff to use their own computing devices to do work, they're struggling to address the programs that enable corporate control and guidance. How is your...

    Michael Tidmarsh25,445 pointsBadges:
  • Wanted to configure PGP on Oracle applications R12

    Hi, We are currently on Oracle Applications R12 based on Unix Platform.  We have a requirement to encrypt the files using the PGP key and FTP to another server. The other server will require to decrypt these files. Can you please let me know from where I have to start? Do we need any...

    khushbub5 pointsBadges:
  • Creating a user in navigator

    When i try to create a user in Navigator it does not allow me to set the DEFAULT OWNER opion from *usrprf to *grpprf. Does anyone know how to do this in Navigator?

    jjsuthe125 pointsBadges:
  • Analyzing Security Audit Journal

    Hello, could you please tell me where can I find a book, guide or course about Tracking and Analizing Security Audit Journal on iSeries?  I have tried Appendix F on Security Guide but there are not all entries and it does not explain how to analize records in journal.  Thanks a lot

    Fabypaumc15 pointsBadges:
  • How to implement secure file sharing between systems of different security levels

    Typical file sharing can create pathways between the systems of different security levels. I want to provide files (containing no sensitive data) from a secure system so that they can be read from low security systems, without having to ftp through firewalls which have more important duties. What...

    Columgrant15 pointsBadges:
  • QSYSOPR Security

    What is the recommended authority setting to QSYSOPR which prevents users from answering messages? What kind of impact does this have on jobs sending messages to the queue?

    MrChristie0 pointsBadges:
  • Linux database security

    What are the database security requirements in a Linux environment?

    Cnotejunebug20 pointsBadges:
  • A host receives an authenticated packet with the sequence number of 181

    A host receives an authenticated packet with the sequence number of 181 and the replay window spans from 200 to 299. What will the host do with this packet?

    Securenetwork5 pointsBadges:
  • Vendor Security Questions

    Hello, I am a student in the Network Security program at the University of Advancing Technology and just read "Plan, Do, Check, Act". The URL is below. https://buildsecurityin.us-cert.gov/bsi/articles/best-practices/deployment/574-BSI.html Years ago everything was stored in the data center and...

    Ad285 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following