Security Tag Directory

Featured Security Questions

  • Encountered a file breach in file vault

    This question is resounding from a 'stacks' issue; If correct? I encountered a File Breach in File Vault, and it's seemingly capable of still attaching to the Gmail account that is hacked. LG-800 Series Logged into Gmail, and I use an LG-700 Series...  Address leads to Georgia; All I know. Lastly,...

    madashell123455 pointsBadges:
  • Cloud security against DOS and DDOS

    Which Intrusion Detection Systems are currently used in cloud environment to mitigate DOS and DDOS attacks?

    Asooom5 pointsBadges:
  • Security issues for MySQL in a cloud environment?

    Hi everyone! In general, I've been asked by my manager to find out about running a MySQL DB on a cloud -- has anyone done this, and what do you think are the security issues that can come up when doing so? More specifically, IT has questioned me about how auditing would work on a cloud, and what...

    MillyT5 pointsBadges:
  • Using API QC3ENCDT in encryption using RSAalgorithm under a Public key, error CPF9DDB !

    Hi I have been working on Encryption/Decryption of data on AS400 v5R4. I have already done the Encryption of data using QC3ENCDT API on COBOOL. Now, I want to use the RSA Public key to encrypt my encryption key. For that I had written a test program but it is throwing one error and I m unable to...

    Syedmohsin455 pointsBadges:
  • Application data security versus network security

    What are the pros and cons of application data security versus network security? Which do you recommend devoting more budget funds to?

    NewnanIT1,110 pointsBadges:
  • Linux database security

    What are the database security requirements in a Linux environment?

    Cnotejunebug20 pointsBadges:
  • Why does encryption take longer than decryption?

    Why does it take longer for a system to process encryption than decryption? That seems to be the case from my experience using AES. I would think the act of decrypting files would take much longer.

    ITKE345,300 pointsBadges:
  • How do you protect a server against Denial of Service attacks?

    How do you protect a server against Denial of Service attacks? What techniques do advanced firewalls use to protect against DoS/DDoS attacks?

    ITKE345,300 pointsBadges:
  • Is it possible to block souce IP’s by their presence in a BotNet?

    A friend of mine in the security industry recently told me that many DOS attacks and general "black hat hacking" attacks usually happen over the TOR network. Would it be possible to dynamically block source IP's by their presence in a BotNet?Would this be effective in blocking DDoS attacks? How...

    ITKE345,300 pointsBadges:
  • Do Windows antivirus tools use API Hooking to protect files?

    From what I understand, antiviruses hook to a file, accesses it and scan the files, and if necessary, make the file inaccessible to protect the system. Is this done via API hooking or some other methodology?

    ITKE345,300 pointsBadges:
  • Working on getting into the field…

    Hello anyone and everyone! My name is Marty and I am working on getting into the Information Security field so I have a lot of questions. For now though, I will post just this one to start. I am 45 and a Disabled Veteran starting late, obviously, getting into the field, so what are the most...

    MockLife5 pointsBadges:
  • Free Chapter – Hardening a SQL Server implementation

    Another free chapter download is available on the IT Bookworm Blog. Written by: Ross Mistry and Hilary Cotter Book: Microsoft SQL Server 2008 Management and Administration. Overview: “If you need to deploy, manage, or secure Microsoft SQL Server 2008, this is the complete, fast-paced, task-based...

    BrentSheets6,925 pointsBadges:
  • HD Host Encryption

    Is HD HOST automatically encrypted when connected to another machine computer?

    Wideopen5 pointsBadges:
  • What are your thoughts on the NSA and Snowden?

    It seems everyone on social media has an opinion about the NSA, Edward Snowden and the attempts to have him extradited. The Snowden saga will likely continue as the world debates questions of online privacy vs. security, as well as the rights of people who leak government information. What do you...

    Chris Leonard4,300 pointsBadges:
  • How concerned are you about your patient records being breached?

    The NSA isn’t the only security issue that is concerning the American populace. A recent study conducted annually by Lieberman Research Group on behalf of Unisys, offers a snapshot of the nation's sense of confidence in national, personal, internet and financial security. Halfway through 2013,...

    Chris Leonard4,300 pointsBadges:
  • Exposure on the Internet

    How can I remove myself from being found on the Internet? I have followed all procedures but my name can still be queried.

    weglowde40 pointsBadges:
  • How should an enterprise prepare for a Project Blitzkrieg-style attack?

    Following the recent Project Blitzkrieg attacks (the reported series of financial fraud attacks against large U.S. banks) Nick Lewis offered several security measures that enterprises can utilize to fend off such attacks including: Requiring out-of-band confirmation of financial transactions...

    Michael Tidmarsh29,890 pointsBadges:
  • How to limit DDoS attacks?

    After the recent Spamhaus distributed denial-of-service attack, many DDoS service providers are concerned that targeted attacks are increasing along with bandwidth sizes. What should we do to minimize the threat of impending attacks?

    Michael Tidmarsh29,890 pointsBadges:
  • Further enhancing public-private key encryption/decryption

    I am a volunteer with a non-profit organization. Part of my proposal entails encrypting and decrypting Personal Identifying Information, its storage on a database, and transfer over the internet. I would like to use or extend software code that improves upon the public-key and private-key paradigm....

    Pja15 pointsBadges:
  • Internet Explorer vs. Firefox

    Hello, I'm the Assistant Editor on SearchWindowsSecurity.com. I'm looking to start a discussion about what browser people are using and why. Also, is anyone considering switching from IE to Firefox, or are your plans to stay with IE? Here's some food for thought... As of Feb. 2005, an estimated 35...

    LMullen0 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following