• Which is more vulnerable among IBM, MS, Apple, Samsung?

    Between these companies, which are more vulnerable? Why would they be vulnerable?

    Creeeper60 pointsBadges:
  • Vulnerability Test analysis

    my project is based on the topic vulnerability test analysis of a computer system.can anyone please tell me what to do and where to start..give me some useful ideas to proceed

    Creeeper60 pointsBadges:
  • Data vs. perimeter vs. network security

    A short time ago, author Wes Noonan wrote some tips for SearchWindowsSecurity.com about deperimeterization. He explained how security is always pitted against business needs, and perimeters have become porous because businesses require traffic from SMTP, HTTP or VPNs to pass through the firewall....

    RobynLorusso230 pointsBadges:
  • which tools can be used to analyse vulnerabilities?

    tools which are used to analyse vulnerabilities(which can be downloaded for free)

    Creeeper60 pointsBadges:
  • DosCreateMutexSem privilege escalation

    I am looking for an explanation of how a privilege escalation hack would be able to be inserted with a call to doscreatemutexsem function from a windows service that is running under the local system account.  I was unable to find anything on Google and not being a security expert I just don't see...

    CarlCioffi345 pointsBadges:
  • SOX Vulnerability Assessment & Audit Prodcuts

    Are there reviews showing SOX Vulnerability Assessment & Audit products? NetIQ seems to show up in a number of security categories(SOX, Mtg, Assessment, Patching), how does it compare to the other products? Thanks for any help & pointers you can provide! Cheers

    WintelEngr0 pointsBadges:
  • Developing an antivirus (efficient):for Windows:Using VC++

    I am working on a Project for making an antivirus.I have 2 other project parteners. But we don't have an guidance on how to develop the antivirus.Plz give me any relevent Information on this subject.(like components of AV,Algorithms(efficient),methods,general detection & removal of virus).(Also...

    4238830 pointsBadges:
  • Developing an antivirus (efficient):for Windows:Using VC++-2

    I am working on a Project for making an antivirus.I have 2 other project parteners. But we don't have an guidance on how to develop the antivirus.Plz give me any relevent Information on this subject.(like components of AV,Algorithms(efficient),methods,general dection & removal of virus).(Also...

    4238830 pointsBadges:
  • Internet Explorer vs. Firefox

    Hello, I'm the Assistant Editor on SearchWindowsSecurity.com. I'm looking to start a discussion about what browser people are using and why. Also, is anyone considering switching from IE to Firefox, or are your plans to stay with IE? Here's some food for thought... As of Feb. 2005, an estimated 35...

    LMullen0 pointsBadges:
  • trojan horse downloader

    hi i have a win NT4.0 sp6 server.its a DNS and web server. from few days the IE was redirecting the sites to some search engines.when i scaned with AVG it detected some trojan horse downloader.i healed the trojan and restarted the DNS.the problem was solved.but after some hours the problem arise...

    Redrose0 pointsBadges:
  • Slow boot-up in win xp home edition

    My notebook(40gb HDD, 256mb RAM)with win xp home edition has become dramatically slow in last 1-2 months. It takes more than 5 minutes to boot even after I removed everything from startup group using msconfig. The initial screen (win XP home) stays atleast 2-3minutes. How can I manage this? Is...

    BinooDas123410 pointsBadges:
  • Website monitoring suggestions?

    Suggestions for website monitoring? Is there something that monitors for security vulnerabilities?

    NewnanIT1,110 pointsBadges:
  • ID Theft and National Security

    If it turns out, as I believe, that enemies of the United States are behind a lot of the major ID thefts in the US, that would mean that a lot of money is going to our enemies. Can we therefore surmise that those who mishandle our identity information, by means of their poor stewardship of our...

    InfoSafety75 pointsBadges:
  • Security advisories

    Does a security research firms track record of vulnerabilities and exploits published make you trust them more, or more likely to hire them?

    Michael Morisy8,323 pointsBadges:
  • I’ve been hacked — I think….

    I'm an IT administrator with a little over 500 end users, running Windows 2000 and XP. One of our users is experiencing a problem with her Internet connection suddenly dropping for no apparent reason. When she restarts her computer, everything works fine for awhile, but then the connection drops...

    LMullen0 pointsBadges:
  • Reporting domain/workgroup membership on your LAN using PERL

    This is more of an FYI. I just posted a perl script that I use to generate a daily report of all Workstations and Servers located on our LAN. This report is sorted by domain/workgroup membership and includes any visible shares on the machine. If anyone is interested you can read it here:...

    Ghigbee0 pointsBadges:
  • Shares Baseline Security Information

    Hello, I use the Microsoft Baseline Security Analyser 2.0 to retrive information about shares in some local servers. I can not understand the diference between the information give in the report, about authorizations in the column Share ACL and Directory ACL. If some one can help me, Thank you PPG

    ITAudit0 pointsBadges:
  • aaa authorization ?

    Which of the following authorization commands are valid? (we have to choose 2 correct) A. aaa authentication exec home radius B. aaa accounting exec home radius C. aaa authorization default none D. aaa authorization exec home radius E. aaa authorization network default enable F. aaa authorization...

    EngineerIT0 pointsBadges:
  • Files and directory access loging

    one of my clients is asking about a daily report contains all files and directories accessed every day and who is accessing it (time and mode:delete ,read ,write.) on a spicific share. so i tried using a script to filter out all events regarding files access but that looks time consuming method ....

    Zbanoon0 pointsBadges:
  • IM Blocking and URL Filtering

    We have Pix515E which is gateway to Internet. We also got IWSS Proxy(Trend Micro) along with URL filtering module. Domain users get directed to IWSS proxy (GPO settings) and restrictions about URL filterings can be imposed as per company's policy. Those users who are not on the domain, they can not...

    EngineerIT0 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following