Security Tag Directory

Featured Security Questions

What is the best security framework?
I am currently a student at UAT and we were directed to this forum with the instructions to post a question about Security Frameworks, so the best question I can have is, What Security Frameworks have any of you personally worked with and which do you feel is better?

Answer Question   |  March 25, 2014  9:50 PM
COBIT, Frameworks, ISO, Security, SKiP
asked by:
5 pts.

How can a general user trace the origin of TCP/IP data generated by persistent e-mail anomaly?
Thank you very much for taking time to consider this question. What do you recommend for a general user who needs to trace the origin and route of TCP/IP data associated with an e-mail message? My SOHO computer is infected by some form of malware. The ISP’s tech support could not resolve it; the relevant...

Answer Question   |  March 22, 2014  5:33 PM
.NET application security, computer information, Forensic analysis, malware, Malware detection, TCP/IP, Webmail
asked by:
15 pts.

What should I do to stop people from hacking or tampering my computer?
I did a chat in a website with a person. Just after few days after, my computer started showing error certificates. (We had Kaspersky internet security set up in it). After that, my CMOS battery failed. I couldn’t use Mozilla Firefox and a lots more has changed. Now what should I do to stop this...

Answer Question   |  March 20, 2014  1:00 PM
cybersecurity, Hackers, Kaspersky, Security
asked by:
25 pts.

Career Advice required for a career in Computer Networking / Security
Dear Sir.I am from a Computer Engineer graduated from Sir Syed University in 2001 then I work for Faysal bank i  for 2 years in IT Operations and General Banking.Then i thought to change my line and start ACCA(Association of Certified Chartere Accountants) and join Price WaterHouse Coopers as Audit Trainee.I couldnot pass ACCA and...

Answer Question   |  March 12, 2014  12:06 PM
Cisco, ISACA certifications, Juniper, Linux, Microsoft
asked by:
5 pts.

What is an Access Password?
I have never been asked for an Access Password. Now my login screen asks for this and we have no idea why, or what the password is. Where do I turn from here?

Answer Question   |  March 3, 2014  3:37 PM
access password, AS/400, Backup, Login
asked by:
5 pts.

Ubuntu login (username and password)
I have an assignment to open ubuntu server using Vmware workstation. The teacher send me the ubuntu server files but when I try to open it, it asks me the user name and password and I don’t know them. Could you please to help me?

Answer Question   |  February 4, 2014  10:54 AM
Linux Ubuntu, Login
asked by:
5 pts.

SSG 140 Port Always Hang
In my office, we have Juniper SSG 140 and 1 port which is the Internet port will always hang everyday and we will need to restart the firewall everyday. Has anyone seen this problem before? If yes, why does the port on the firewall will hang?

Answer Question   |  January 20, 2014  2:08 AM
Firewall, Juniper firewall, Juniper SSG, Juniper SSG 140
asked by:
16,930 pts.

AS400 User Log ons
Can I find out how many times a user had logged on in the last six months?

Answer Question   |  January 14, 2014  10:38 PM
asked by:
55 pts.

Can I push out Microsoft Security Essentials to an entire network?
Can I push out Microsoft Security Essentials to an entire network? How can this be achieved easily and quickly?

Answer Question   |  December 12, 2013  4:35 PM
Microsoft Security, Microsoft Security Essentials, Network security, Network Security Management
asked by:
975 pts.

Road to become a Security Auditor?
Hi, I am really confused about way to follow to become a Security Auditor… and the opportunities it has in future.. esp. in India? Currently I am working as a Security Consultant but dealing only with Security Related products including Firewalls, NMS, IPS etc and not Standards like BS7799, ISO27001, CoBit etc. Being in Networking...

Answer Question   |  December 12, 2013  8:22 AM
CCIE, Certified Information Systems Auditor, CISA, Cisco Certified Internetwork Expert, Information Security Management System, ISMS, IT careers, Security auditing, Security Auditor, Security audits, Security careers
asked by:
5 pts.

Checklists for Router, Firewall and Switch security
I have recently been shifted to Information security audit department. I need some checklists to check the security compliance for Router, Switch, and Firewall. Please provide me some checklists to audit the same.

Answer Question   |  December 12, 2013  6:03 AM
Audit and compliance, Auditing (compliance), Compliance checklist, ISMS, Security audits, Security compliance
asked by:
130 pts.

Cannot Ping Public IP from ISA server 2006
Dear I am unable to Ping the Public IP over the Internet, My, Client is Behind ISA, ISA disallow to PING the Public IP on internet I want to enable but cannot done in ISA server 2006 E.E. I already add the ICMP and PING protocol in my Array

Answer Question   |  December 12, 2013  4:31 PM
ISA 2006, ISA Server 2006, ISA Server configuration, ISA server error, Ping Public IP
asked by:
110 pts.

asked by:
0 pts.

Licensing/pricing options around Forefront Client Security
What are the licensing/pricing options around Forefront Client Security? This question is from the Microsoft Live Chat which took place on July 13th.

Answer Question   |  December 6, 2013  8:20 PM
forefront security, microsoft forefront licensing, Microsoft Forefront pricing, microsoft forefront security
asked by:
56,485 pts.

THREE (3) Security Concerns
We have a desktop with Windows XP SP2, Microsoft Office 2003, and a subscription to McAfee Total Protection 2008 that began in September 2007, among other things. We also just purchased a laptop with Windows Vista and Norton’s Antivirus/Antispyware 2008 so far. We will eventually install Office 2007 on both the desktop and the laptop,...

Answer Question   |  December 6, 2013  9:08 PM
McAfee Total Protection, Norton, Security, Software conflicts
asked by:
55 pts.

What are some of the best practices in handling computer viruses?
I know this might sound like a broad question but I’m looking to start a good discussion here. For many SMBs, acquiring malware sometimes feels like an inevitability (despite putting in different security patches/antivirus software/etc.). I’m not looking to talk about the prevention of viruses but what should someone do after their workstation has been...

Answer Question   |  December 5, 2013  8:57 PM
Antivirus, malware, Security, virus
asked by:
56,485 pts.

Transmitting encrypted PDFs via email
Hi!  I could use some help. My company plans to send out critical data to our clients in encrypted PDF format. Is there a danger that they could be blocked in the future as virus scanners become more sophisticated and conclude that they could be carrying malware?

Answer Question   |  November 27, 2013  9:07 PM
Encrypted PDFs, Malware detection, PDF attachments
asked by:
56,485 pts.

Security Audit
what form or procedeure would you use for a final security Audit after the Avaya system is installed?

Answer Question   |  November 18, 2013  9:04 PM
Audit and compliance, Auditing, Avaya, IT audit, Security audits
asked by:
20 pts.

Our team is looking to a tool to scan a PDF file for malware
Our development team is looking for a tool that can scan a PDF file to determine if it might contain malware or a virus. Alternatively, the tool assigns a risk level to PDF. A web-based solution could work if it’s scriptable. Does anyone have any suggestions?

Answer Question   |  November 15, 2013  2:37 PM
malware, PDF
asked by:
56,485 pts.

Will litigation against Huawei affect me as a buyer?
I have been working on assessing a few leading network equipment vendors in the likes of Cisco, HP, Juniper, etc., to procure Layer 2 switches. I am currently assessing the capabilities of Huawei and i have been hearing about a litigation raised by Nortel (Avaya) against Huawei on their Layer 2 switches, however, I have...

Answer Question   |  November 6, 2013  6:12 PM
Cisco, HP, Huawei, Juniper, Layer 2 switches, Unified Communications, Unified Communications Hardware
655 pts.

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: