Security Tag Directory

Featured Security Questions

  • Digital Signature

    Our HR department would like to go paperless and they believe the first step is to implement Digital Signature for all employees. What is the first step in this process. Suggestions welcomed.

    SYSCO NNE5 pointsBadges:
  • Is locating a data center on the top floor of your company bulding a cost effective solution?

    In the wake of floods warning i would specify the locating your DC on the first floors would be dangerous as " first hit ".

    Latin10 pointsBadges:
  • Disaster Recovery Site using SAN disk replication

    We are setting up a Disaster Recovery Site using SAN disk replication, for all our databases including Oracle; A uniform recovery solution for all IT applications. The Oracle Database will be replicated in the DR site SAN. Appreciate if you could enlighten on pitfalls? Is it a safe solution?

    ITKE350,945 pointsBadges:
  • Connectivity Testing

    Connectivity between DMZ Server and Application Server Application Server to Database Server Load Balancer to Application Server / Database Server Please suggest the sequence of Steps to check the connectivity between these layers (Telnet, FTP Tests etc.) which will be immensely helpful for...

    Vrajagop5 pointsBadges:
  • Digital document signatures for an enterprise

    Does anyone have a good enterprise solution for digital document signatures using Microsoft PKI/CA? I am looking for something that provides a good indication that a document has been digitally signed using a user-certificate generated by Microsoft AD CA (Server 2003). I have tried it in Word 2003...

    Labnuke9932,960 pointsBadges:
  • Internet configuration in iSeries

    Hi all! We have a iSeries machine connected in local network. ADSL router is in the same network. I have added a default route in iSeries to the router like *DFTROUTE *NONE 192.168.0.33 *NONE I can ping all the devices in the local network from iSeries. But I'm unable to ping the other network like...

    Sureyz2,475 pointsBadges:
  • Database Newbie

    I'm quite new to database security and MS SQL server 2005 and 2008 and was hoping to find some extra sites or books to help as I am currently writing an application to send OS info and service tags to our SQL server. I obviously can t have the SQL server directly on the internet with an open port...

    Neutrino50 pointsBadges:
  • Do I need digital certificates to be sox compliant?

    Dear LS, I'd like to understand to which extend I need digital certificates (PKI) in order to be in compliance with current most important regulations including sox, but also other relevant regulations that might be applicable. This includes topics like WIFI within an Enterprise on a Global scale...

    Mhoddenbagh5 pointsBadges:
  • I am under a ddos attack and need to block country

    I have Cisco ASA Hardware Firewall and O don't see how to block either a bunch of IP addresses (thousands) or deny access to a whole country. Is it possible? Adding one IP at a time is not an option. Thanks

    Greycheetah5 pointsBadges:
  • Decrypt encrypted partition disk

    How do I decrypt an encrypted partition disk?

    SNAREBOI5 pointsBadges:
  • Cloud security against DOS and DDOS

    Which Intrusion Detection Systems are currently used in cloud environment to mitigate DOS and DDOS attacks?

    Asooom5 pointsBadges:
  • Security issues for MySQL in a cloud environment?

    Hi everyone! In general, I've been asked by my manager to find out about running a MySQL DB on a cloud -- has anyone done this, and what do you think are the security issues that can come up when doing so? More specifically, IT has questioned me about how auditing would work on a cloud, and what...

    MillyT5 pointsBadges:
  • Hosting one AS/400 IP address to internet

    We are planning to host one AS/400 server to internet. Hence we created a network device and connected our DMZ server to AS/400. We assigned the internet IP address. Using intranet IP, we created the private digital certificate for the system and export to the desktop. I have a copy of the...

    naresh1984365 pointsBadges:
  • Certificate enrollment failed – says RPC server unavailable

    I checked my logs in windows 2003 R2 and received the following error: certificate enrollment for local system failed to enroll for one Domain Controller certificate from (SERVER NAME). (RPC server unavailable 0√ó800706ba (win32: 1722))

    Tis10 pointsBadges:
  • Critical Error in Security Log

    All, I manage a Windows 2003 Small Business Server Network with 9 clients. The server provides all network services. We use Logon/logoff, shared storage, and print server functions. We do not use exchange except for the server reporting tool. We do use about 4 instances of SQL. All clients are...

    FlyNavy0 pointsBadges:
  • Linux database security

    What are the database security requirements in a Linux environment?

    Cnotejunebug20 pointsBadges:
  • Data vs. perimeter vs. network security

    A short time ago, author Wes Noonan wrote some tips for SearchWindowsSecurity.com about deperimeterization. He explained how security is always pitted against business needs, and perimeters have become porous because businesses require traffic from SMTP, HTTP or VPNs to pass through the firewall....

    RobynLorusso230 pointsBadges:
  • Why does encryption take longer than decryption?

    Why does it take longer for a system to process encryption than decryption? That seems to be the case from my experience using AES. I would think the act of decrypting files would take much longer.

    ITKE350,945 pointsBadges:
  • How do you protect a server against Denial of Service attacks?

    How do you protect a server against Denial of Service attacks? What techniques do advanced firewalls use to protect against DoS/DDoS attacks?

    ITKE350,945 pointsBadges:
  • Is it possible to block souce IP’s by their presence in a BotNet?

    A friend of mine in the security industry recently told me that many DOS attacks and general "black hat hacking" attacks usually happen over the TOR network. Would it be possible to dynamically block source IP's by their presence in a BotNet?Would this be effective in blocking DDoS attacks? How...

    ITKE350,945 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following