Security Tag Directory

Featured Security Questions

  • Best practice, tools to implement Two Factor Authentication

    What are the best implementation and tools to implement Two factor authentication

    Choukran5 pointsBadges:
  • Allow authentication in Lotus Domino web services

    I understand it's a short question but I'm fairly new to Lotus Notes. Would there be a way to allow authentication in Lotus Domino web services? Can I do it through Java?

    ITKE345,295 pointsBadges:
  • Creating HTTP authentication on a Lotus Domino server

    I've been trying to an Android application that would be capable of reading different amounts of data from a Lotus Notes database. I've already started to create the a page to test the HTTP authentication and have run into some problems. Here's my code: public void GoAuth(View v){ final String...

    ITKE345,295 pointsBadges:
  • Access a password protected URL using Java code

    I am trying to access a URL using the HttpURLConnection in Java code. The URL is password protected. I have to authenticate our Lotus Domino server for accessing before even attempting to access the URL. How do I authenticate my Lotus Domino server to access the password protected URL using the...

    Domino Ask The Experts435 pointsBadges:
  • Free anti-virus software: Cloud vs AVG

    Which is the better freeware... Cloud antivirus or AVG? Also, when installing one in favor of the other, should the previous software be deleted?  In which order should this be done? For example:  I'm running AVG right now, and I've been told Cloud has a more effective product.  Should I delete...

    Jamesohanlon15 pointsBadges:
  • Password remover for Excel 2007

    I have forgotten my password for my imp Excel sheet. How would I recover that Excel sheet now?

    Gvk5 pointsBadges:
  • How to Block Chat in the Network

    Dear All, I am wrting this mail to you all, to know if any you have been successfull in Blocking Chats on your networks, and if so, then how have you acheived it? Could you please tell me which Ports to Block for MSN, Yahoo, Rediff, ICQ, Skype. I am using a NetAPPs Net Cache C 1300, and I am trying...

    Komlink0 pointsBadges:
  • how to program

    how to understand java,html,qsl script or language

    johnlog5 pointsBadges:
  • When I boot my laptop I have a Black Screen Password to be entered?

    I have a IBM, Thinkpad T-22 with Windows XP. When I boot the computer a black screen comes up and asked for a password. I have taken that hard drive out and put it into another computer and the samething happens. Correct me if I am wrong but, I believe that the hard drive has a Bios lock out on it....

    SexyFatMan5 pointsBadges:
  • ADS for campus – Architecture

    We are planning to do some IT services to other companies on our campus. In the near future large and small companies will join on our campus and some need all ind of services and others perhaps only Internet access . . . but all companies need to have access to some data and IT services (campus...

    TrevJans5 pointsBadges:
  • Security/ Audit Check list for DB2

    Hi, I'm in the process of hardening the DB2 in Linux and I'm looking for a checklist to help me make sure I don't miss anypoint. Since I'm not an expert on DB2 I would like to have a starting point. I'm looking to make sure I don't leave open doors and also I want ot make sure I don't get an Audit...

    Josec990 pointsBadges:
  • Application data security versus network security

    What are the pros and cons of application data security versus network security? Which do you recommend devoting more budget funds to?

    NewnanIT1,110 pointsBadges:
  • Data vs. perimeter vs. network security

    A short time ago, author Wes Noonan wrote some tips for SearchWindowsSecurity.com about deperimeterization. He explained how security is always pitted against business needs, and perimeters have become porous because businesses require traffic from SMTP, HTTP or VPNs to pass through the firewall....

    RobynLorusso230 pointsBadges:
  • User circumventing security

    We have a rogue user who knows more than she should. She can grant herself and other users the authority to access files that are supposed to be secured. Does anyone know of how we can monitor her activity or go back and review what she has done or anything that we can do. We think she may be using...

    Mouse3330 pointsBadges:
  • How to generate a listing of security information of Win 2003 server folders

    Does somebody know if there is a way to query the Directory database to obtain a listing that includes security and other settings (shares, permissions, etc) of all folders and subfolders of a machine running Win 2003 Server ? Any help or comment will be appreciated.

    carlosdl69,175 pointsBadges:
  • Firewall configuration Testing

    I need to do some tests of my firewall configuration. Specifically, I have to run a policy audit independent of any config management systems with an eye to inspecting Cisco PIX/ASA/FWSM and Juniper NetScreen/JunOS devices. Of secondary important (but they have to be done) are reviewing iptables...

    ITKE345,295 pointsBadges:
  • I’m looking for a stronger authentication method for web services

    I deployed a two-factor-authentication solution in order to strength logon to our web applications. The majority of our users who have new tokens are also pop3/imap users (this is from a long time ago). However, I noticed web applications are well protected by 2FA , but mail applications is an easy...

    ITKE345,295 pointsBadges:
  • Intercepting two-factor authentication (SMS)

    I'm trying to learn more about "IT Security" and I've come across two-factor authentication. I understand two-factor authentication mechanisms use SMS to deliver single-use passphrase to the user. But how secure is it? Is it hard to intercept the SMS message containing the passphrase? Do mobile...

    ITKE345,295 pointsBadges:
  • My program is being blocked by my antivirus software (AVG)

    I recently created a program that I've been working on that downloads files. It's been working fine until a user is using AVG. It seems that in order to fix the issue, AVG's "Email Protection" must be disabled. I've already tried adding either my program or the JRE to an exceptions list. It doesn't...

    ITKE345,295 pointsBadges:
  • Security Audit

    what form or procedeure would you use for a final security Audit after the Avaya system is installed?

    HubeHube20 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following