Security Tag Directory

Featured Security Questions

  • Windows 2003 services

    I am an auditor and trying to create a script that will gather the service's and there status and start up types for windows server 2003. Is there a way to gather this information without bogging the server down within a script?

    Tz4kk15 pointsBadges:
  • LAN auditor

    I am looking for a free software that will let me Audit/Inventory all my Hardware & Software on my domain network. Any suggestions would be greatly appreciated.

    Jsuarez145 pointsBadges:
  • Risk Assessment for Application Systems

    Can please share the risk assessment methods/ questionnaires/approach for application systems.We understand that the assessment may cover technology, people, and process. We need to come-out with the assessment report indicating the risk level & rating of the application systems.

    Umihafiy10 pointsBadges:
  • Fingerprint based attendance system

    What is the methodology used for a fingerprint based attendance system?

    Misebom5 pointsBadges:
  • Looking for Basel ii training

    I would like to take the Basel ii Certification, but I feel that I am not ready, does anyone know a training course? Which will be not expensive, and good.

    KebabIT130 pointsBadges:
  • Windows Server 2003 schedule task could not run

    We run a schedule task on our 2003 server. The task to execute a program runs for 1 day only. The next day the task shows "could not start" and after reentering the password for authentication it would start again for another day. I know its not an authentication problem due to the task run all day...

    Kak5 pointsBadges:
  • SOAP service authentication in Microsoft Silverlight

    The SOAP Service is authenticated, whenever I'm trying to execute my SilverLight application, it shows the authentication window. I even tried the below method to pass the credentials but it does not work can anyone help with that, its making big issue. BasicHttpBinding AdminService_Binding = new...

    VictorSagayaraj5 pointsBadges:
  • SAS70 audit for Data Center

    The electrical network that feeds the access points, CCTV cameras, intruder detectors, etc. must need to be independent from the electrical system that feeds the computing equipment? Is it right to ask if the logs of access point are backed up and kept in a secure place? What about the videos that...

    Beatrix Kiddo60 pointsBadges:
  • Need Storage encrypted solution

    Hi, I hope you can give me an option to have encrypted data at storage level, preferable SAN but if not possible NAS can be adopted. Must be 256 bit encrypted, this is required for call recording compliance. Thanks in advance.

    Xtornet5 pointsBadges:
  • How to perform network audit or assessment

    How can I perform a network audit or assessment?

    Apalani20045 pointsBadges:
  • Track records of security advisories

    Does a security research firms track record of vulnerabilities and exploits published make you trust them more, or more likely to hire them?

    Michael Morisy8,323 pointsBadges:
  • Radius Authentication of Wireless APs

    I have several wireless access points that I want to deploy in our organization. I have a windows domain and Active Directory 2003 and I want the authentication to be this way. Can anyone advice me on what radius server I can use and what kind of wireless security to configure, and the basic steps...

    JuneC155 pointsBadges:
  • Password complexity validation program

    Is anybody have the password complexity validation program ,which can force user to use special characters in password?

    Vinay40055 pointsBadges:
  • What is the future of application Whitelisting

    Can anyone tell me what is the future of Application Whitelisting?

    Raleighmason10 pointsBadges:
  • SIM Vendors: Any thoughts?

    I’d like to know what kind of experiences folks out there have had with SIM products (QRadar, ArcSight, Log Logic, etc). Do people out there utilize log management? What products are you using/have you used? Experiences good and bad as well as recommendations would be very welcome.

    ITKE352,565 pointsBadges:
  • Alternative to using LSA?

    Hi All, I am integrating AD authentication into a software module that I have built but I am having problems. The software runs on an embedded image of Windows, which doesn't support LSA (Local Security Authority). Is there an alternative subsystem to using LSA? I have been reading up on other...

    SamCK25 pointsBadges:
  • Auditing administration tasks via the GUI

    I have a requirement to monitor (audit) administrator users in our Windows environment but can't find anybody who can provide a tool that will let me record and play back the GUI-based activity. I can track the CLI based activity. Anybody know of a utility/tool that will let me track the GUI...

    Neil535 pointsBadges:
  • How has Biometrics improved the security of a computer system

    Would anyone tell me how biometrics have improved the security of a computer system? Thanks!

    Katso79ron5 pointsBadges:
  • Identify 802.1x clients in an AD domain

    I'm designing an 802.1x wired deployment with MAC Authentication Bypass for Windows workstations without the 802.1x client. I need to identify which workstations have the client and which do not. I also need to configure the 802.1x client on the workstations that do have it. The 802.1x client is...

    Peterp270 pointsBadges:
  • Biometrics

    I have to give a seminar of 20 mins regarding boimetrics, so please help me as in which sub topic in that should I choose. Please help me with the link where I can find info also about it.

    Bganupama5 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following