Security Tag Directory

Featured Security Questions

  • Cyberbulling detection

    Is cyberbulling detection based on semantic enhancement?

    anuradha10410 pointsBadges:
  • layer 2 & layer 3 switch

    Hi All, what is the basic difference between layer 2 & layer 3 switch. how can configure layer 2 & layer3 managable switch

    Psharma11760 pointsBadges:
  • Internet Explorer vs. Firefox

    Hello, I'm the Assistant Editor on SearchWindowsSecurity.com. I'm looking to start a discussion about what browser people are using and why. Also, is anyone considering switching from IE to Firefox, or are your plans to stay with IE? Here's some food for thought... As of Feb. 2005, an estimated 35...

    LMullen0 pointsBadges:
  • Will TLS/SSL protect MITM attacks that try to collect traffic from web browsers?

    Let's say Person A is connected to the internet and is browsing websites (HTTPS secured or TLS). Will that prevent information from being captured by a MITM attack? What are some (fairly easy to moderate) ways TLS or HTTPS can be defeated?

    kliu0015 pointsBadges:
  • How do you know if your computer has been hacked into?

    I have a few error messages coming up on my laptop screen saying someone is trying to hack into your computer. I thought it was just a virus. Does anyone know if it was a virus or was someone really trying to hack in?

    Verynew20 pointsBadges:
  • Does EU privacy Directive 95/46 protect data of US citizens located on a server in Europe?

    Does EU privacy Directive 95/46 protect data of US citizens located on a server in Europe?

    mikegg5 pointsBadges:
  • Which IT security certification should I choose?

    I have overall 17 Years of IT experience on application development and Project / Program Management. In the recent years, my focus is more in to the program management. I am very much interested to get certified on the Information Security / CyberSecurity side, as the focus on the information...

    Jerish5 pointsBadges:
  • SLA breached

    I want to configure a SLA that will be breached after 40min staying in pending state and reset the state to active after the SLA is breached. The start condition that I have given as state pending and stop condition as state is not pending. But the SLA is not getting breached, after 40 min it is...

    NiveditaSanvi5 pointsBadges:
  • Encrypting data

    What's the best way to go about encrypting my data?

    EVanSon5 pointsBadges:
  • Leakage of message

    Can anybody can see my message in between left sender or receiver?

    krishanjangir5 pointsBadges:
  • Skills for cyber management administration

    Do I need computer skills to work in cyber management administration?

    pcmorgan5 pointsBadges:
  • iPhone 6 Privacy

    Has there been any indication that the iPhone 6 is better at privacy than other iPhone versions? There is speculation because the iPhone 6 is being pushed so hard by the cell phone companies that it could have embedded monitoring or is more secure and that is why the FBI doesn't like it. (Per news...

    milesdoc5 pointsBadges:
  • Network Connection Freezes

    For some reason, at random, among 20 PCs on my network, in the morning or during the day, the network connection stops responding for both intranet and internet communications. The only solution thus far is to remove the NIC from the Device Manager, reboot the PC, and let Windows XP Pro find the...

    DboiSOBE0 pointsBadges:
  • How do I qualify for a cybersecurity job?

    I'm currently a Linux system administrator and I'm looking to get into the cybersecurity field. How to find and qualify for cybersecurity job?

    calibration195125 pointsBadges:
  • Microsoft IT Scam

    Is there a simple HoneyPot setup that will allow assisting the detection of the "Microsoft IT Support Scam" instigators? These guys call on the phone monthly to thousands of individuals hoping to get someone to open a remote connection so they can drain private data and install spyware/ransomware....

    TexasGeek5 pointsBadges:
  • Signs and symptoms for a cyber attack in a computer and in a network

    What are the signs and symptoms for a cyber attack in a computer and in a network?

    sungchi5 pointsBadges:
  • What is cryptography?

    What is cryptography? How is cryptography related to network security over the internet?

    brightline10 pointsBadges:
  • Could an encrypted random sequence be attacked?

    If we encrypt a random sequence, could it be attacked (does crypt-analysis depend on that the message has a specific meaning? )

    alimannaa25 pointsBadges:
  • Most important software for cybersecurity

    What is the most important software and threads for cybersecurity?

    priyankabaskaran5 pointsBadges:
  • What are the general threats of cybersecurity?

    In cybersecurity, what are the general threats and counter measures?

    farhat5 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

Thanks! We'll email you when relevant content is added and updated.

Following