Security Tag Directory

Featured Security Questions

  • Can biometrics be used for fraud prevention?

    Can biometric identifiers be used for fraud prevention in a developing nation?

    doxy1115 pointsBadges:
  • Command to open a local backdoor

    What's the command that needs to be entered to open a local backdoor (server mode) which listens on Port 2380 for incoming connections

    hemant785 pointsBadges:
  • Biometric techniques for preventing fraud voting

    Can someone please suggest some biometric techniques for preventing fraud voting?

    jaskirat5 pointsBadges:
  • Why do organizations fingerprint?

    When I came to the USA, someone made me do a fingerprint (which I have no knowledge of). Today, anywhere I go to find work, the fingerprint will come up. So I don't know what to do.

    Annankunde15 pointsBadges:
  • How can I disable Bitdefender Safepay?

    Can I disable Safepay and just keep the Bitdefender Internet Security?

    garig15 pointsBadges:
  • shdocpv.dll – virus – hijack problem

    Hi, I'm sorry if I had chosen the wrong recipient. I am running Windows 2000. When I open my browser (IE 6.0) I get this:res://shdocpv.dll/blank.htmOrres://C:WinntSystem32shdocpv.dllsecurity.htm Please help me to get rid of this. Thanks!

    CUser020 pointsBadges:
  • Biometrics

    Could one use biometrics in smoking a brisket on a offset cooker?

    tron1825 pointsBadges:
  • Critical Error in Security Log

    All, I manage a Windows 2003 Small Business Server Network with 9 clients. The server provides all network services. We use Logon/logoff, shared storage, and print server functions. We do not use exchange except for the server reporting tool. We do use about 4 instances of SQL. All clients are...

    FlyNavy0 pointsBadges:
  • Data vs. perimeter vs. network security

    A short time ago, author Wes Noonan wrote some tips for SearchWindowsSecurity.com about deperimeterization. He explained how security is always pitted against business needs, and perimeters have become porous because businesses require traffic from SMTP, HTTP or VPNs to pass through the firewall....

    RobynLorusso230 pointsBadges:
  • Biometrics with Visual Basic 6

    How I can use biometrics in V.B 6.0? Any sample code? Please help me?

    99527375915 pointsBadges:
  • Biometrics and Privacy

    Which method(s) of biometrics that would not meet with undue resistance from potential users would you recommend to a manager to replace password-based access controls?

    nvme1110 pointsBadges:
  • Should the design cycle of new products include an analysis of security vulnerabilities?

    Black Hat 2013 was a tension filled affair.In addition to National Security Agency Director General Keith B. Alexander defending U.S. surveillance of American citizens, claiming it's a necessity in a world threatened by what he called "terrorists among us," SeungJin "Beist" Lee showed attendees the...

    Chris Leonard4,300 pointsBadges:
  • Single Sign On with Windows NT and IIS and Domino

    Hi there, my dear peers, What solutions do you know for the following situation: A user has logged in into Windows NT using a certain name/password combination. He then starts his web browser and opens an application on an IIS web server (same domain) where he must be authenticated without entering...

    HenkeS0 pointsBadges:
  • What’s your take on DefCon asking Feds to stay away from the conference?

    After DefCon founder Jeff Moss' announcement that Feds should skip the hacker conference, the SearchSecurity team asked Trey Ford, General Manager at Black Hat, what Black Hat's stance on the issue. His response: All Feds are welcome. With all the hoopla surround the NSA, what's your take on DefCon...

    Michael Tidmarsh28,540 pointsBadges:
  • Biometric technology

    What do I need to set up a biometric access control system?

    ttk10 pointsBadges:
  • Unknown Threats

    Apart from honeypots, what are the different methods to find unknown threats which are prevalent? How do I find methods to mitigate them. PS: all the vulnerabilities are known to all the n/w administrators and then can take measures to mitigate attacks but this doesn't happen..Hackers are at least...

    Czarleo0 pointsBadges:
  • Biometrics security in banking

    How can the introduction of biometric surveillance and security benefit a bank? How can it improve a country's banking sector's banking? Not only banks but whole of banking in general. Most banks and ATM's have CCTV cameras inside them but what other type of surveillance equipment can be introduced...

    Blueduck30120 pointsBadges:
  • Manipulation Engine Definition

    Hi all! I've read the term "manipulation engine" (related to passwords) in a couple of papers but aside from guessing could not find a proper definition of it (not even in this website !!!). Can anyone please redirect me to / provide a clear definition of this term, related to "Security"? Many...

    DiegoDH275 pointsBadges:
  • biometrics

    What are some of the pros and cons to biometrics

    ma5430 pointsBadges:
  • Need for police officers

    Do you think that the technology will improve to a point where police officers are not needed?

    ma5430 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following