Security Tag Directory

Featured Security Questions

  • RSA 1024 for Delphi and .NET

    Hi All, I need to do public key encryption with certificates so that I can encrypt something in Delphi and pass it to a dot net app and have it decrypt. It needs to be RSA 1024. I have been able to do this in Delphi but not sure how to decrypt it in dot net. Does anyone having experience in doing...

    Virtualnil15 pointsBadges:
  • Utimaco/Safeguard for full disk encryption

    I am curious if anyone is using this product for full disk encryption. As well as specifics about the function that it performs with synchronization. I understand that it grabs the windows login info and stores it in a file, what I don't understand is why when I change the Windows password on the...

    Securityn00b12850 pointsBadges:
  • Decrypt encrypted folder from Microsoft Windows

    Good day, Facing problem to decrypt encrypted folder from Windows. I have formatted previous OS which was used to encrypt the folder. Client didn't inform me about the encryption that they have done this folder and they are non PC literate too. Didn't have the key exported also. How can I decrypt...

    Kesevan45 pointsBadges:
  • Should the OWA & ActiveSync Client Access Server be installed in the DMZ or can the internal CAS be safely accessed directly

    We have a small domain and not a lot of money. Should we pay the extra money to buy a Client Access Server to put in the DMZ to allow users to access OWA externally and PDA uses to connect to their mailboxes? If so, are there online instructions somewhere detailing this process of setting up such a...

    RuthParish1560 pointsBadges:
  • How do I DDoS a phone’s hotspot?

    How do I knock offline a phones hotspot? I got the software to do hit people offline but how do I do it to phones?

    josephmc5 pointsBadges:
  • Looking for quality test-tracking tool

    Any quality test-tracking tool which has live & automated dashboards so that the entire team is updated at any given point of time?

    AnonymousUser13,030 pointsBadges:
  • Setting database security to prevent restoring databases on other SQL Servers

    Within a database in my SQL Server, I am able to control users from Alter Table and Alter SP, and a strong ‘sa’ password is also created. When I login to the backup of that database with a backup operator ID, the backup operator is able to restore the database, and his and others’ rights are...

    SQL Server Ask the Experts2,585 pointsBadges:
  • Digital Signature

    Our HR department would like to go paperless and they believe the first step is to implement Digital Signature for all employees. What is the first step in this process. Suggestions welcomed.

    SYSCO NNE5 pointsBadges:
  • Is locating a data center on the top floor of your company bulding a cost effective solution?

    In the wake of floods warning i would specify the locating your DC on the first floors would be dangerous as " first hit ".

    Latin10 pointsBadges:
  • Disaster Recovery Site using SAN disk replication

    We are setting up a Disaster Recovery Site using SAN disk replication, for all our databases including Oracle; A uniform recovery solution for all IT applications. The Oracle Database will be replicated in the DR site SAN. Appreciate if you could enlighten on pitfalls? Is it a safe solution?

    ITKE352,565 pointsBadges:
  • Connectivity Testing

    Connectivity between DMZ Server and Application Server Application Server to Database Server Load Balancer to Application Server / Database Server Please suggest the sequence of Steps to check the connectivity between these layers (Telnet, FTP Tests etc.) which will be immensely helpful for...

    Vrajagop5 pointsBadges:
  • Digital document signatures for an enterprise

    Does anyone have a good enterprise solution for digital document signatures using Microsoft PKI/CA? I am looking for something that provides a good indication that a document has been digitally signed using a user-certificate generated by Microsoft AD CA (Server 2003). I have tried it in Word 2003...

    Labnuke9932,960 pointsBadges:
  • Internet configuration in iSeries

    Hi all! We have a iSeries machine connected in local network. ADSL router is in the same network. I have added a default route in iSeries to the router like *DFTROUTE *NONE 192.168.0.33 *NONE I can ping all the devices in the local network from iSeries. But I'm unable to ping the other network like...

    Sureyz2,475 pointsBadges:
  • Database Newbie

    I'm quite new to database security and MS SQL server 2005 and 2008 and was hoping to find some extra sites or books to help as I am currently writing an application to send OS info and service tags to our SQL server. I obviously can t have the SQL server directly on the internet with an open port...

    Neutrino50 pointsBadges:
  • Do I need digital certificates to be sox compliant?

    Dear LS, I'd like to understand to which extend I need digital certificates (PKI) in order to be in compliance with current most important regulations including sox, but also other relevant regulations that might be applicable. This includes topics like WIFI within an Enterprise on a Global scale...

    Mhoddenbagh5 pointsBadges:
  • I am under a ddos attack and need to block country

    I have Cisco ASA Hardware Firewall and O don't see how to block either a bunch of IP addresses (thousands) or deny access to a whole country. Is it possible? Adding one IP at a time is not an option. Thanks

    Greycheetah5 pointsBadges:
  • Decrypt encrypted partition disk

    How do I decrypt an encrypted partition disk?

    SNAREBOI5 pointsBadges:
  • Cloud security against DOS and DDOS

    Which Intrusion Detection Systems are currently used in cloud environment to mitigate DOS and DDOS attacks?

    Asooom5 pointsBadges:
  • Security issues for MySQL in a cloud environment?

    Hi everyone! In general, I've been asked by my manager to find out about running a MySQL DB on a cloud -- has anyone done this, and what do you think are the security issues that can come up when doing so? More specifically, IT has questioned me about how auditing would work on a cloud, and what...

    MillyT5 pointsBadges:
  • Hosting one AS/400 IP address to internet

    We are planning to host one AS/400 server to internet. Hence we created a network device and connected our DMZ server to AS/400. We assigned the internet IP address. Using intranet IP, we created the private digital certificate for the system and export to the desktop. I have a copy of the...

    naresh1984365 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following