Security Tag Directory

Featured Security Questions

How to block Fortiguard web filtering
How can I block Fortiguard web filtering?

Answer Question   |  April 15, 2014  2:16 PM
FortiGuard, Web filtering
asked by:
5 pts.

How can I divide a network in two segments?
Two companies are sharing a DSL connection, and for security reasons, the network has to be split up. They still have to share the DSL, but should not see each other. It is posible to split up physically, but how do they share the DSL? Can anyone point me to a solution or a guide?...

Answer Question   |  April 14, 2014  10:51 AM
Firewalls, Forensics, Incident response, Intrusion management, Network security, Networking, Performance management, VPN, Wireless
asked by:
0 pts.

Why am I getting storage differences between OS X and iOS?
I’m currently writing several dozen binary data files on OS X that can be read on iOS devices. Here’s my following structure: struct poiStruct { double latitude, longitude; char titleString[41]; }; The only problem with this is that its occupying 64 bytes on OS X and 60 bytes on iOS. Does anyone know why this...

Answer Question   |  April 6, 2014  4:00 PM
IOS, OS X, Storage
asked by:
55,945 pts.

InterVlan Routing on Cisco
Hi, I have Ipbase Image on a Cisco 4506 switch and configured several vlans eg. 2,3,4 and each have ip addresses associated with them as given below. interface vlan 2 ip address 172.16.2.1 255.255.255.0 interface vlan 3 ip address 172.16.12.1 255.255.255.0 i have said ip routing but i do not see ip routing displayed in...

Answer Question   |  April 6, 2014  9:42 AM
Cisco 4506, Cisco VLAN, InterVLAN, Switches, Switching, VLAN, VLAN Routing
asked by:
35 pts.

How can I use XMPFFramework for my iOS?
I’m trying to figure out how to use XMPPFramework’s core data for storing incoming messages. This many seem like a general questions but does anyone have any tutorials or guides on how to use it. I see “user objects” which can have many different resources. Is each message a new resource that I create and...

Answer Question   |  April 6, 2014  4:00 PM
IOS, Storage, XMPFFramework
asked by:
55,945 pts.

How should I store my static data in an iOS app?
I have a huge amount of data located in my application that I need to access, but never be changed. I’m using it in other applications, such as JSON files and SQL databases, but neither one seems straightforward in iOS. I’m trying to stay from Core Data so should I start storing my data in...

Answer Question   |  April 2, 2014  4:00 PM
Apple, IOS, Storage
asked by:
55,945 pts.

How to Block Chat in the Network
Dear All, I am wrting this mail to you all, to know if any you have been successfull in Blocking Chats on your networks, and if so, then how have you acheived it? Could you please tell me which Ports to Block for MSN, Yahoo, Rediff, ICQ, Skype. I am using a NetAPPs Net Cache...

Answer Question   |  March 29, 2014  4:13 AM
Application security, Database, DataCenter, Encryption, Firewalls, Forensics, Incident response, Instant Messaging, Intrusion management, Microsoft Exchange, Network security, Secure Coding, VPN, Wireless
asked by:
0 pts.

Is it better to use native iOS and Android development or Adobe Air?
Is it better to invest more money building an Application for iOS and Android in the native way or it worth using AIR for both? I am using a lot of media on the APP, so I want it to be fast.

Answer Question   |  March 27, 2014  6:03 PM
Adobe AIR, Android, IOS, Programming
asked by:
5 pts.

Help! Hackers keep getting in my computer
I have been hacked for months and I dont know what to do to keep them out. I am not a expert on the computer but I get what I need done, but I was totally unaware that what has happened to me is possible. I got Kevin’s book “Hacking for Dummies” to try &...

Answer Question   |  March 20, 2014  10:57 PM
Hackers, Security
asked by:
5 pts.

What should I do to stop people from hacking or tampering my computer?
I did a chat in a website with a person. Just after few days after, my computer started showing error certificates. (We had Kaspersky internet security set up in it). After that, my CMOS battery failed. I couldn’t use Mozilla Firefox and a lots more has changed. Now what should I do to stop this...

Answer Question   |  March 20, 2014  1:00 PM
cybersecurity, Hackers, Kaspersky, Security
asked by:
25 pts.

Bypassing FortiGuard web filter
I want to know if can we bypass our fortiguard web filter. By any means, I have tried all the different VPN software and proxy sites but it’s still not working. Torrent is also blocked. Is there any way to by pass it? Please help.

Answer Question   |  March 12, 2014  11:49 AM
Firewall, FortiGuard, web filters
asked by:
5 pts.

How to troubleshoot firewall installation
How can I troubleshoot my Firewall installation?

Answer Question   |  March 6, 2014  2:55 AM
Firewall, IDS
asked by:
5 pts.

asked by:
20 pts.

ISO/IEC 27001 IDEAL Model
Hello, i’m a student at UAT and for class we are talking about the Pro’s and Cons of Frameworks. For this i’m going about ISO/IEC 27001 Implementation Framework, The IDEAL Model, from the Software Engineering Institute. First the Pros to this, i feel that the IDEAL model goes more in depth than the other simple...

Answer Question   |  March 1, 2014  4:17 PM
CMU, framework, Ideal, Infosec, SEI, UAT
asked by:
5 pts.

VPN stablish but can’t ping
Im working with a 871 cisco router and I need to do a VPN between 2 offices so i made the next configurations. crypto isakmp policy 1  encr 3des  authentication pre-share  group 2 crypto isakmp key vpn3j3mpl0 address 201.216.201.135 ! crypto ipsec security-association lifetime seconds 86400 ! crypto ipsec transform-set VPN esp-3des esp-sha-hmac crypto map...

Answer Question   |  February 19, 2014  2:53 PM
Cisco, IPsec, VPN
asked by:
5 pts.

shdocpv.dll – virus – hijack problem
Hi, I’m sorry if I had chosen the wrong recipient. I am running Windows 2000. When I open my browser (IE 6.0) I get this: res://shdocpv.dll/blank.htm Or res://C:WinntSystem32shdocpv.dllsecurity.htm Please help me to get rid of this. Thanks!

Answer Question   |  January 30, 2014  6:23 PM
backdoors, Current threats, Hacking, human factors, Intrusion management, Servers, Spyware, Trojans, Viruses, Windows 2000 Server, worms
asked by:
0 pts.

Hacked whilst using computer
Hi. Someone claims to have hacked into the PC I was using and set up and sent an email. They claim it was hidden. Is this possible

Answer Question   |  January 16, 2014  6:30 AM
Hacking, Hacking tools and techniques
asked by:
25 pts.

Cracking 32 bit rar file password
I’m looking for a program to crack a 32 bit password for a .rar file. If you answer this question, please tell me how long the program will take.

Answer Question   |  January 15, 2014  3:56 AM
Hacking, RAR file, Security
asked by:
10 pts.

Need Guidence
Dear Sir/Madam As a Cyber Security Expert and Jetking Certified & BCA graduate, I was looking forward in the field of Ethical hacking in Government Sectors….. Is there any course or a class you can suggest to me (What to choose & what to do further)? I am interested in Network Securities and Ethical Hacking.

Answer Question   |  January 6, 2014  9:34 PM
Hacking, Security
asked by:
5 pts.

Security control Bandwidth per user in ISA Server
Hello, Dear all is there any procedure in windows that user is allow to read the contents of share folder but it is not allow to copy it. How it is Possible. Secondly if we want to control Bandwidth per user in ISA how it is Possibe without using Third party software. Thanks Muhammad Usman.

Answer Question   |  December 12, 2013  6:10 AM
Bandwidth, Bandwidth management, ISA, ISA Server, Security, Shared folders, User Permissions
asked by:
125 pts.

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: