Security Tag Directory

Featured Security Questions

Why do organizations fingerprint?
When I came to the USA, someone made me do a fingerprint (which I have no knowledge of). Today, anywhere I go to find work, the fingerprint will come up. So I don’t know what to do.

Answer Question   |  April 15, 2014  3:22 PM
Biometrics, Fingerprint
asked by:
15 pts.

How can I divide a network in two segments?
Two companies are sharing a DSL connection, and for security reasons, the network has to be split up. They still have to share the DSL, but should not see each other. It is posible to split up physically, but how do they share the DSL? Can anyone point me to a solution or a guide?...

Answer Question   |  April 14, 2014  10:51 AM
Firewalls, Forensics, Incident response, Intrusion management, Network security, Networking, Performance management, VPN, Wireless
asked by:
0 pts.

Decrypt encrypted partition disk
How do I decrypt an encrypted partition disk?

Answer Question   |  April 10, 2014  3:08 PM
Disk Encryption, Partition disc
asked by:
5 pts.

Hosting one AS/400 IP address to internet
We are planning to host one AS/400 server to internet. Hence we created a network device and connected our DMZ server to AS/400. We assigned the internet IP address. Using intranet IP, we created the private digital certificate for the system and export to the desktop. I have a copy of the certificate in my...

Answer Question   |  April 7, 2014  12:33 PM
AS/400 administration, Digital certificates, IP address
asked by:
365 pts.

How to Block Chat in the Network
Dear All, I am wrting this mail to you all, to know if any you have been successfull in Blocking Chats on your networks, and if so, then how have you acheived it? Could you please tell me which Ports to Block for MSN, Yahoo, Rediff, ICQ, Skype. I am using a NetAPPs Net Cache...

Answer Question   |  March 29, 2014  4:13 AM
Application security, Database, DataCenter, Encryption, Firewalls, Forensics, Incident response, Instant Messaging, Intrusion management, Microsoft Exchange, Network security, Secure Coding, VPN, Wireless
asked by:
0 pts.

Certificate enrollment failed – says RPC server unavailable
I checked my logs in windows 2003 R2 and received the following error: certificate enrollment for local system failed to enroll for one Domain Controller certificate from (SERVER NAME). (RPC server unavailable 0√ó800706ba (win32: 1722))

Answer Question   |  March 26, 2014  6:54 AM
Certificate Enrollment, Digital certificates, Error 800706BA, RPC, RPC Server Unavailable, Web security, Windows Server 2003
asked by:
10 pts.

Windows server 2008 disk space problem
Hi. I have installed Windows 2008 server, and on this platform Forefront firewall. I have a problem: Disk C volume is 30 GB. When I looked up the properties of Disk C, there is 22 GB used space but when I looked up total folders volume on Disk C, all of the volume is 11...

Answer Question   |  March 25, 2014  7:26 AM
Disk space, ESX 4.0, Firewalls, Forefront Client Security, Windows Server 2008, Windows Server 2008 Backup
asked by:
1,235 pts.

How can a general user trace the origin of TCP/IP data generated by persistent e-mail anomaly?
Thank you very much for taking time to consider this question. What do you recommend for a general user who needs to trace the origin and route of TCP/IP data associated with an e-mail message? My SOHO computer is infected by some form of malware. The ISP’s tech support could not resolve it; the relevant...

Answer Question   |  March 22, 2014  5:33 PM
.NET application security, computer information, Forensic analysis, malware, Malware detection, TCP/IP, Webmail
asked by:
15 pts.

Bypassing FortiGuard web filter
I want to know if can we bypass our fortiguard web filter. By any means, I have tried all the different VPN software and proxy sites but it’s still not working. Torrent is also blocked. Is there any way to by pass it? Please help.

Answer Question   |  March 12, 2014  11:49 AM
Firewall, FortiGuard, web filters
asked by:
5 pts.

How to troubleshoot firewall installation
How can I troubleshoot my Firewall installation?

Answer Question   |  March 6, 2014  2:55 AM
Firewall, IDS
asked by:
5 pts.

How to encrypt an .exe file into a .Jpeg file?
Hello guys. I have a question. I want to know how can we encrypt a .exe file into a .JPEG file? Its like, when we open the image file, the .exe file should run on its own. I know there are some complicated encryption methods but are there any simple methods? Can we do that?...

Answer Question   |  February 5, 2014  3:34 AM
.exe, Encryption, File encryption, JPEG, Windows 7
asked by:
45 pts.

SSG 140 Port Always Hang
In my office, we have Juniper SSG 140 and 1 port which is the Internet port will always hang everyday and we will need to restart the firewall everyday. Has anyone seen this problem before? If yes, why does the port on the firewall will hang?

Answer Question   |  January 20, 2014  2:08 AM
Firewall, Juniper firewall, Juniper SSG, Juniper SSG 140
asked by:
16,930 pts.

Communication lag through a firewall
We’re having problems with data connection between our internal network and an external system (outside our firewall).  We are using AS/400 with ASP.NET.  When requests go out, they propagate quickly on our internal system, but there is a significant lag – as long as 3 minutes – to the external system.  Not sure if it’s...

Answer Question   |  January 6, 2014  2:51 PM
AS/400, ASP.NET, Firewall configuration, network communication
asked by:
54,905 pts.

Configuration problem on 2950 port security sticky behavior
Hi, I am trying to put port security on a port, I want it to shutdown if another computer gets plugged into that port. I followed the following steps: I set these options: switchport mode access switchport port-security switchport port-security maximum 1 switchport port-security violation shutdown Switch#show port-security interface fastEthernet 0/4 Port Security : Enabled...

Answer Question   |  December 12, 2013  8:38 AM
Cisco, Firewalls, Forensics, Incident response, Intrusion management, Network security, Networking, Patch management, Project management, VPN, Wireless
asked by:
50 pts.

Is Forefront client security server compatible with Server 2008 R2?
Is Forefront client security server compatible with Server 2008R2? This question is from the Microsoft Live Chat which took place on July 13th.

Answer Question   |  December 12, 2013  7:43 PM
Endpoint security, Forefront Client Security, Windows Server 2008 R2
asked by:
54,905 pts.

Critical Error in Security Log
All, I manage a Windows 2003 Small Business Server Network with 9 clients. The server provides all network services. We use Logon/logoff, shared storage, and print server functions. We do not use exchange except for the server reporting tool. We do use about 4 instances of SQL. All clients are Windows XP Professional patched to...

Answer Question   |  December 12, 2013  7:08 AM
Biometrics, configuration, DataCenter, Desktops, Digital certificates, Identity & Access Management, Management, Microsoft Systems Management Server, Microsoft Windows, OS, Patch management, patching, PEN testing, Platform Security, provisioning, Security, Security tokens, Servers, Single sign-on, Software, SQL Server, Tech support, vulnerability management
asked by:
0 pts.

Bypassing Cisco Iron Port
How do I bypass Cisco iron port web filtering using proxy setting and port numbers?

Answer Question   |  December 12, 2013  5:14 PM
Cisco Firewall, Firewalls, Iron Port
asked by:
110 pts.

Security/ Audit Check list for DB2
Hi, I’m in the process of hardening the DB2 in Linux and I’m looking for a checklist to help me make sure I don’t miss anypoint. Since I’m not an expert on DB2 I would like to have a starting point. I’m looking to make sure I don’t leave open doors and also I want...

Answer Question   |  December 12, 2013  12:45 PM
Application security, Database, DB2, Encryption, Instant Messaging, Microsoft Exchange, Oracle, Secure Coding, SQL
asked by:
0 pts.

asked by:
0 pts.

AES encyption: More secure than SHA1?
I know this is more of a curiosity but I wanted to get some expert opinions on this. I recently heard someone recommend stepping up from md5ing (not to SHA1) but to AES encrypting the password, which would use itself as the key. Does anyone have any recommendations on if that would be more or...

Answer Question   |  December 6, 2013  4:02 PM
AES encryption, Encryption, Passwords, SHA1
asked by:
54,905 pts.

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: