Security Tag Directory

Featured Security Questions

  • Leading cloud companies true levels of security

    After being burned by JustCloud.com and their horrible ways of conducting business, I am curious to know if there is some report, or database, or comprehensive review of the true levels of security that the main players in the cloud industry provide, how it is they achieve such levels of security,...

    AndyRGP5 pointsBadges:
  • Disk copy detection

    I suspect my portable hard drive has been copied without authorization. Is there a way to detect what and when any data on portable hard drive has been copied?

    4clifford5 pointsBadges:
  • Is the use of public clouds a good strategy for our company?

    Given that the company currently: Has no hardware or software infrastructure Intends to use cloud based SaaS for its major business applications Use MS Office Professional and a few other misc software tools as its only PC/Notebook installed software. Would you concure that maximizing the use of...

    IMFSystems5 pointsBadges:
  • Encountered a file breach in file vault

    This question is resounding from a 'stacks' issue; If correct? I encountered a File Breach in File Vault, and it's seemingly capable of still attaching to the Gmail account that is hacked. LG-800 Series Logged into Gmail, and I use an LG-700 Series...  Address leads to Georgia; All I know. Lastly,...

    madashell123455 pointsBadges:
  • How do you know if your computer has been hacked into?

    I have a few error messages coming up on my laptop screen saying someone is trying to hack into your computer. I thought it was just a virus. Does anyone know if it was a virus or was someone really trying to hack in?

    Verynew20 pointsBadges:
  • Cyber Attack Analysis

    Why has cyber attacks increased since 2008?

    kreali5 pointsBadges:
  • What do you think of the NSA programs that monitor Internet activity and phone records?

    After news broke of the U.S. National Security Agencies (NSA) access to information from a large segment of Internet traffic (social media and domestic companies), discussions about national security and online privacy issues have reached a new high. What do you think of the NSA programs that...

    Michael Tidmarsh30,440 pointsBadges:
  • Using API QC3ENCDT in encryption using RSAalgorithm under a Public key, error CPF9DDB !

    Hi I have been working on Encryption/Decryption of data on AS400 v5R4. I have already done the Encryption of data using QC3ENCDT API on COBOOL. Now, I want to use the RSA Public key to encrypt my encryption key. For that I had written a test program but it is throwing one error and I m unable to...

    Syedmohsin455 pointsBadges:
  • Information engineering and cybersecurity

    Is computer and information engineering a part of cybersecurity? If yes tell me why and in which subject please?

    meshaa40 pointsBadges:
  • What should I do to stop people from hacking or tampering my computer?

    I did a chat in a website with a person. Just after few days after, my computer started showing error certificates. (We had Kaspersky internet security set up in it). After that, my CMOS battery failed. I couldn't use Mozilla Firefox and a lots more has changed. Now what should I do to stop this...

    Kittu15Tamilnadu25 pointsBadges:
  • What can CIOs do to counter the spread of cyber attacks?

    With Jeep and Burger King becoming the recent victims of a hacker attack, cybersecurity has become the focus point for many enterprises and CIOs. What should CIOs do to counter the spread of cyber attacks? Can anything be done at all?

    Michael Tidmarsh30,440 pointsBadges:
  • shdocpv.dll – virus – hijack problem

    Hi, I'm sorry if I had chosen the wrong recipient. I am running Windows 2000. When I open my browser (IE 6.0) I get this:res://shdocpv.dll/blank.htmOrres://C:WinntSystem32shdocpv.dllsecurity.htm Please help me to get rid of this. Thanks!

    CUser020 pointsBadges:
  • SAS credit card deliquency project

    Hi, I'm an entrprenure and just want to start some project on SAS. I have got a client and just want to know about that. Can you guys help me with a real time SAS project or can you guide me that where to find that project?

    rkumar715 pointsBadges:
  • Cybersecurity

    What is cybersecurity?

    MONIKABHATHEJA5 pointsBadges:
  • Application data security versus network security

    What are the pros and cons of application data security versus network security? Which do you recommend devoting more budget funds to?

    NewnanIT1,110 pointsBadges:
  • Data vs. perimeter vs. network security

    A short time ago, author Wes Noonan wrote some tips for SearchWindowsSecurity.com about deperimeterization. He explained how security is always pitted against business needs, and perimeters have become porous because businesses require traffic from SMTP, HTTP or VPNs to pass through the firewall....

    RobynLorusso230 pointsBadges:
  • Is there really a security advantage when it comes to spittling a password?

    I've been reading more and more about the LANMAN (LM) hash and I'm having trouble understanding some of the concepts. Is there really any security advantage when it comes to splitting a password, encrypting the two halves separately, and combining the halves to form one hash? Or is it just more of...

    ITKE346,080 pointsBadges:
  • How secure is Identity-Based encryption?

    Over the past several years, I was always taught to never create my own crypto algorithm. But now I'm looking into Voltage SecureMail (which does use identity-based encryption) and I think I'm way over my head in trying to figure out the quality of the system.If you've used Voltage before, I'm...

    ITKE346,080 pointsBadges:
  • How to find cyphers for HTTPs?

    I'm trying to find some cyphers which are known to be secure for HTTPs. The OpenSSL website has a long list of cyphers that can be used with SSL and TLs, but how to tell which, if any, are still valid and of those which would support HTTPS? Is there a recent paper or similar tool I can use to find...

    ITKE346,080 pointsBadges:
  • GUIDs: Are they actually safe?

    I'm studying to become a security expert and I've noticed a ton of websites use GUIDs for password resets, unsubscribe requests, etc. I'm assuming most sites use them because they're easy to use and they're unique. But I'm curious to find out how safe GUIDs actually are. Are they actually intended...

    ITKE346,080 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following