• Has this computer been compromised?

    One of my computers runs a strange set of files that I don't recognize when it boots:bash.exe, curl.exe, uname.exe, sed.exe, rm.exe, tail.exe, cut.exe, awk.exe, cat.exe, chmod.exe, ls.exe, grep.exeI know I haven't uploaded any programs related to these files, so should II be worried about these...

    ITKE54,660 pointsBadges:
  • AES encyption: More secure than SHA1?

    I know this is more of a curiosity but I wanted to get some expert opinions on this. I recently heard someone recommend stepping up from md5ing (not to SHA1) but to AES encrypting the password, which would use itself as the key. Does anyone have any recommendations on if that would be more or less...

    ITKE54,660 pointsBadges:
  • Does adding other programs to a firewall compromise security?

    I'm using Ubuntu 11.04 as a Firewall in SOHO environment with the thought of installing a GUI on it. Is it true that this would be a mistake because I should not run other applications on a firewall. Why is this the case?I just don't understand why putting a GUI on it would affect the "security" of...

    ITKE54,660 pointsBadges:
  • How to retrieve passwords in Thunderbird via HDD?

    How does Thunderbird 8 store passwords and how does one retrieve them via HDD? I would usually use NirSoft, but it's not compatible with Thunderbird 8.

    ITKE54,660 pointsBadges:
  • Email security: What does “message opened by mailclient” mean?

    I've recently read that a Belgium MP claimed that her email headers were being read during routing. It also said that the headers had this message "message opened by mailclient". What does this message actually mean?

    ITKE54,660 pointsBadges:
  • Shouldn’t a person just RSA-encrypt the entire document?

    After doing some research on Security, I've finally figured out how to verify if an email / document was actually sent by the "sender". Here's the process I've figured out:The sender gives their public RSA key to the recipient.The sender also uses SHA1 to hash the document.Then he uses his private...

    ITKE54,660 pointsBadges:
  • Is there really a security advantage when it comes to spittling a password?

    I've been reading more and more about the LANMAN (LM) hash and I'm having trouble understanding some of the concepts. Is there really any security advantage when it comes to splitting a password, encrypting the two halves separately, and combining the halves to form one hash? Or is it just more of...

    ITKE54,660 pointsBadges:
  • Questions about our single firewall setup

    We are planning to run the following setup: a firewall between our internal zones and the public internet. Each of our trusted zones use a different VLAN with a 3-layered switch while the DMZ zone is on the firewall itself, trunked to a layer 2 switch on the firewall.Would this setup provide...

    ITKE54,660 pointsBadges:
  • Licensing/pricing options around Forefront Client Security

    What are the licensing/pricing options around Forefront Client Security? This question is from the Microsoft Live Chat which took place on July 13th.

    ITKE54,660 pointsBadges:
  • Recording failed login attempts in security log for Windows XP SP3

    Can we record any other information in the security log about a failed log in attempt on a Windows XP SP3 desktop? And if so what other information and how can we get at it?

    NewnanIT1,110 pointsBadges:
  • Security certificate in Outlook 2003 and 2007

    I am Running Outlook 2007/Outlook 2003 on Windows 7/XP sp3 systems with pop mail from non exchange local e-mail server. The mail servers security certificate expired. I created a new self signed certificate and installed new server certificate on the clients, however I am getting certificate...

    GaryCarlisle25 pointsBadges:
  • Security implications surrouding outbound SSH traffic

    The school that my son goes to blocks outbound SSH traffic. The users inside the network can't use Port 22 / trying to make a SSH connection through another port is also blocked. The reason I was given for this was because it's putting the users inside the network at risk and would allow port...

    ITKE54,660 pointsBadges:
  • Security Implementation

    With the recent spate of news stories about the apparent information assurance/security failures that have come to light as a result of the events that transpired between Aaron Bar and Anonymous, I’ve been discussing security program implementation with my classmates at the Universtity of...

    Packetsneaker20 pointsBadges:
  • User circumventing security

    We have a rogue user who knows more than she should. She can grant herself and other users the authority to access files that are supposed to be secured. Does anyone know of how we can monitor her activity or go back and review what she has done or anything that we can do. We think she may be using...

    Mouse3330 pointsBadges:
  • ChoicePoint CISO says breach not an information security issue

    The CISO of ChoicePoint says the theft of private information on 145,000 from its databases isn't an information security issue because conmen used fraud, not hacking tools or techniques, to get the information. Anyone agree with that? Check it out:...

    Athletica0 pointsBadges:
  • Cross-platform tools for security, monitoring

    What would be some good cross-platform administration tools to use for an environment running Windows OS X and Debian's test release lenny? It is a small business (<200 employees) and the main concerns are being able to perform secure file transfers throughout the system and keeping track of...

    Linux - Ask the Expert270 pointsBadges:
  • How to generate a listing of security information of Win 2003 server folders

    Does somebody know if there is a way to query the Directory database to obtain a listing that includes security and other settings (shares, permissions, etc) of all folders and subfolders of a machine running Win 2003 Server ? Any help or comment will be appreciated.

    carlosdl65,110 pointsBadges:
  • Network Security refresher training

    Hello, I was wondering if anyone can refer me to a good and basically free online network auditing, testing, documentation resource available online. thank you.

    Fwguyus5 pointsBadges:
  • security CheckPoint vs. PIX firewalls

    Dear can any one know which one best technology Checkpoint or PIX?

    Networkfierwall5 pointsBadges:
  • OST files

    We are migrating users from one exchange server to another. the users sit in remote sites and use very slow links to connect to the exchange server. Is it possible to use the old ost on the pc for the new exchange server instead of recreating the ost with the new exchange server, which can take...

    PaulBone10 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following