Security Tag Directory

Featured Security Questions

  • Fingerprint recognition in mobile devices

    I have certain specific questions with fingerprint scanning as I look at it from a information security perspective. How does mobile fingerprint recognition actually work? Additionally, is there any specific method all manufacturers follow?Following are some follow-up questions regarding same topic...

    SNKulkarni5 pointsBadges:
  • PCI compliance: Disable AUTH on Port 25

    Due to PCI compliance, we have to disable plaintext authentication. We were able to do this through encapsulating communications between our mail server and clients with TLS on port 465. Here's where the problem is: Port 25 has to remain open / unencrypted for us to receive mail, but it shouldn't...

    ITKE366,220 pointsBadges:
  • How to write unique domain authentication identifier

    How do I write udai (unique domain authentication identifier)?

    ramuyadav20 pointsBadges:
  • Internet Explorer vs. Firefox

    Hello, I'm the Assistant Editor on SearchWindowsSecurity.com. I'm looking to start a discussion about what browser people are using and why. Also, is anyone considering switching from IE to Firefox, or are your plans to stay with IE? Here's some food for thought... As of Feb. 2005, an estimated 35...

    LMullen0 pointsBadges:
  • Vendor audit program for quality and compliance

    Does Ariba have a vendor audit program which addresses quality and compliance?

    Cschra5 pointsBadges:
  • Maximum protection for Windows 8 laptop

    Hi, I have Windows 8, 2015 BitDefender total security on my laptop & users still manage to get onto my laptop. They stop my vid downloads, they get my passwords, they send mails in my name. Can someone help me on how to protect my laptop? I have an administrator user account & my user...

    Blackbob5 pointsBadges:
  • How to configure in Tacacs+ server and Cisco router for password expiration

    Hi, Currently my Cisco router using Tacacs+ server for authentication. I would like to enhance the password security by forcing the user to change their password every 2 months. After 2 months when they trying to login to the router they will be prompted to key in new password. Is there any way I...

    cslaw20105 pointsBadges:
  • Authentication and authorization issues in e-Commerce

    What are the issues facing authentication and authorization in e-Commerce?

    Mashael19925 pointsBadges:
  • Techologies used in biometrics

    What are technologies used to develop a biometric application? Is Java is enough or are other languages needed?

    Manjunathhoigegudde15 pointsBadges:
  • Deleted users audit trails in AS/400

    Scenario 1: I have been doing some cleanup of user profiles that have not logged in more than 365 days to satisfy a SOX Compliance issue. I am doing this across all of our Health facilities (57). IT Personnel from one of the facilities is concerned that they would lose the Audit trail for these...

    DCORDERO4725 pointsBadges:
  • Need Storage encrypted solution

    Hi, I hope you can give me an option to have encrypted data at storage level, preferable SAN but if not possible NAS can be adopted. Must be 256 bit encrypted, this is required for call recording compliance. Thanks in advance.

    Xtornet5 pointsBadges:
  • Barcode and fingerprint biometrics

    What is the definition of barcode and fingerprint biometrics?

    YEm5 pointsBadges:
  • Do any browsers have support for pre-shared-key encryption/authentication?

    My partner and I already have a web application with highly valuable business data. All of our communication is encrypted through TLS/SSL. I know this is a safe protocol but it can still be compromised if someone installed a CA certificate through our computer. So we're trying to strengthen the...

    ITKE366,220 pointsBadges:
  • What is the use of the “secret” displayed when setting up 2 Factor Authentication?

    Is there a purpose to the 'secret' that is always displayed when I take a picture of the QR code to setup a two-factor authentication on a non-Google site? Do I even need it? If I save it, wouldn't anyone be able to get in with the login code?

    ITKE366,220 pointsBadges:
  • How is FIDO U2F different from OTP?

    I recently saw that Google and Yubico announced the availability of cryptographic security tokens, after the FIDO U2F specification. I'm curious to find out if this is just another two-factor authentication or is it significantly better than SecureID or TOTP. Can anyone share their opinion....

    ITKE366,220 pointsBadges:
  • SIP trunking issue: Authentication problems (CUCM and own developed PBX)

    Hey, I have built a PBX by using the Ozeki SDK and and want to connect it to my existing Cisco Unified Communications Manager PBX by using SIP trunking. By following the instructions of this Cisco setup guide, I have successfully connect the SDK to CUCM, but SIP trunking does not work, because of...

    RajeshCO275 pointsBadges:
  • POS null & authentication failure error

    Whenever I recharge my rynga VoIP with my global debit visa card in online an error message comes in my mobile number. That is POS null. authentication failure.

    DINUUZ5 pointsBadges:
  • How to remove free AVG 2014 from computer

    I have tried to remove free AVG 2014 from Programs and features. It will NOT remove, what now? I am on a Windows Vista operating system.

    Noriega5 pointsBadges:
  • Command to open a local backdoor

    What's the command that needs to be entered to open a local backdoor (server mode) which listens on Port 2380 for incoming connections

    hemant785 pointsBadges:
  • Tape encryption for IBM iSeries server

    I need tape encryption solution for IBM iSeries 720 server. Do you guys know any solution other than BRMS?

    ashrafpantho40 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following