Security Tag Directory

Featured Security Questions

  • External IT company auditing security and policies

    We have an external IT company auditing our security and policies. What kind of access should we give them? Should we be worried about auditing the auditors?

    Troubleshooter24755 pointsBadges:
  • Auditing for database security

    Why is a database monitor and auditing critical to ensure database security?

    sweetpeajd120 pointsBadges:
  • Why we require DAST and SAST, if secure design review is in place?

    I have a query what does Secure Design review don't cover? Why we require DAST and SAST if secure design review is in place (due to low budget this question is raised).

    Rithin5 pointsBadges:
  • Internet Explorer vs. Firefox

    Hello, I'm the Assistant Editor on SearchWindowsSecurity.com. I'm looking to start a discussion about what browser people are using and why. Also, is anyone considering switching from IE to Firefox, or are your plans to stay with IE? Here's some food for thought... As of Feb. 2005, an estimated 35...

    LMullen0 pointsBadges:
  • Multi-factor vendor security– How do you measure its security?

    A quick question, what about vendor security?  How can you make sure their product is safe? How do you validate that? What things should you look in a Multi-factor authentication vendor that guarantees their product is safe/secure?

    PowershellAdmin5 pointsBadges:
  • How to remove AVG file

    This dt.dat is in an AVG file and I am trying to remove all AVG Free from my computer and am having a lot of trouble taking it off.

    emberblaze60 pointsBadges:
  • layer 2 & layer 3 switch

    Hi All, what is the basic difference between layer 2 & layer 3 switch. how can configure layer 2 & layer3 managable switch

    Psharma11760 pointsBadges:
  • SSO Server Setup

    Hi, I am very new to SSO and I want to learn how I can create my own server. Are there any tutorial guides in setting one up? Any helpful information would be a great help. Thank you.

    weajane015 pointsBadges:
  • Am I being targeted by a hacker?

    About 4 months ago, I got a call on my land line from what I (at the time) assumed was a Microsoft impersonator. (Indian guy tells you something's wrong with your PC.) I lost my temper and insulted him before dropping the phone. Last month I got another call from what I assumed was another scammer...

    Lardass15 pointsBadges:
  • Biometric attendance system

    Can a Biometric attendance machine record or show false time, if so, under what circumstances?

    baljit5 pointsBadges:
  • Fingerprint recognition in mobile devices

    I have certain specific questions with fingerprint scanning as I look at it from a information security perspective. How does mobile fingerprint recognition actually work? Additionally, is there any specific method all manufacturers follow? What is the best way to make fingerprint recognition very...

    SNKulkarni60 pointsBadges:
  • Two Factor Authentication and the different methods

    Its clear that 2FA will add security however with a variety of instances where 2FA has been compromised (think OTP by Text or other Token based Authentication). What is the view on using harder or more robust and hardware secured 2FA like PKI?

    RoryG1045 pointsBadges:
  • Why do we have 10 keys for 128 bits in AES?

    I'm working on the project, making the information secure with the help of AES. I need to know a few details before I proceed into this project. Please provide me an easy to understand answer.

    twinki172435 pointsBadges:
  • Can’t open my Microsoft Works files

    I optimized registry and performance with BitDefender and now I can't open my Works 8 files. It says Works can not access one or more files it needs to run Word Processor.

    mgbpre5 pointsBadges:
  • Citrix MetaFrame Login – Credential Validation Error

    I am new to Citrix Metaframe. Recently I had a virus attack and My Citrix server crushed. I have re-installed all the necessary services and also installed Citrix Metaframe 4.0. I have published applications on a myfarm and I can open then in Citrix program neighborhood. The problem comes when I...

    Sam19795 pointsBadges:
  • Authentication XML based mechanisms

    Are there any XML based mechanism for authentication?

    Wajid115 pointsBadges:
  • How is FIDO U2F different from OTP?

    I recently saw that Google and Yubico announced the availability of cryptographic security tokens, after the FIDO U2F specification. I'm curious to find out if this is just another two-factor authentication or is it significantly better than SecureID or TOTP. Can anyone share their opinion....

    ITKE977,905 pointsBadges:
  • Biometric Coding in VB 6.0

    Is there a sample code to get fingerprints image in Visual Basic 6.0?

    RexLan5 pointsBadges:
  • Pre authientication for hotels

    How do hotels run a pre authentication at check-ins and capture a final amount at check out?

    jonpineda5 pointsBadges:
  • laptop login

    WinXP laptop, part of domain, when disconnected frm domain uses cached login. While disconnected, changed from domain member to workgroup member. :( Now login only has name/pwd text boxes - can't get domain selection box. Thus, can't login. How to get domain option back at login screen? (How to...

    ITDefensePatrol0 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

Thanks! We'll email you when relevant content is added and updated.

Following