Security Tag Directory

Featured Security Questions

  • Why is my private key false?

    I am using digital signature in C#, I have given path of my .key file i.e including certificate and RSA private key but I am not clear that why the object of X509Certificate class showing has private key property value "false"

    GurjitSingh5 pointsBadges:
  • How to set a user’s default signature in Outlook 2013

    Would it be possible to programatically set Outlook 2013's default signature settings? I can create the user's signature fine but I would like it to appear by default. Would I be able to use the Outlook Object Model to do this? Thank you for all the help.

    ITKE354,295 pointsBadges:
  • How to decrypt PGP in CentOS

    I want to decrypt PGP in CentOS. How can I do that?

    AnkitJiniwal5 pointsBadges:
  • What are some of the risks of not securing a DMZ?

    A user has been included in an Organizations DMZ. What are the risks of this and how can damage be prevented?

    MwilaKangwa5 pointsBadges:
  • Using a different signature for external and internal emails in Outlook 2007

    My organization requires us to use a specific signature, including an image, for external emails. Now they would like us to use a different signature for internal emails, without an image. Would this be possible using Outlook 2007?

    ITKE354,295 pointsBadges:
  • Digital signature and entity authentication

    What is used to create a digital signature?

    michaelasmoah10 pointsBadges:
  • Procedures for a new area

    We are a company where we have experience on network remote administration and now we have open a new area, The area of security. Now I need to start to make new procedures like when a new customer come to us and ask if we can handle the security for his network. I need to know if some one can...

    Millan0 pointsBadges:
  • Examine and analyze a digital signature

    How do I examine and analyze a digital signature?

    holsen5 pointsBadges:
  • RSA 1024 for Delphi and .NET

    Hi All, I need to do public key encryption with certificates so that I can encrypt something in Delphi and pass it to a dot net app and have it decrypt. It needs to be RSA 1024. I have been able to do this in Delphi but not sure how to decrypt it in dot net. Does anyone having experience in doing...

    Virtualnil15 pointsBadges:
  • Utimaco/Safeguard for full disk encryption

    I am curious if anyone is using this product for full disk encryption. As well as specifics about the function that it performs with synchronization. I understand that it grabs the windows login info and stores it in a file, what I don't understand is why when I change the Windows password on the...

    Securityn00b12850 pointsBadges:
  • Decrypt encrypted folder from Microsoft Windows

    Good day, Facing problem to decrypt encrypted folder from Windows. I have formatted previous OS which was used to encrypt the folder. Client didn't inform me about the encryption that they have done this folder and they are non PC literate too. Didn't have the key exported also. How can I decrypt...

    Kesevan45 pointsBadges:
  • Should the OWA & ActiveSync Client Access Server be installed in the DMZ or can the internal CAS be safely accessed directly

    We have a small domain and not a lot of money. Should we pay the extra money to buy a Client Access Server to put in the DMZ to allow users to access OWA externally and PDA uses to connect to their mailboxes? If so, are there online instructions somewhere detailing this process of setting up such a...

    RuthParish1560 pointsBadges:
  • How do I DDoS a phone’s hotspot?

    How do I knock offline a phones hotspot? I got the software to do hit people offline but how do I do it to phones?

    josephmc5 pointsBadges:
  • Looking for quality test-tracking tool

    Any quality test-tracking tool which has live & automated dashboards so that the entire team is updated at any given point of time?

    AnonymousUser13,030 pointsBadges:
  • Setting database security to prevent restoring databases on other SQL Servers

    Within a database in my SQL Server, I am able to control users from Alter Table and Alter SP, and a strong ‘sa’ password is also created. When I login to the backup of that database with a backup operator ID, the backup operator is able to restore the database, and his and others’ rights are...

    SQL Server Ask the Experts2,585 pointsBadges:
  • Digital Signature

    Our HR department would like to go paperless and they believe the first step is to implement Digital Signature for all employees. What is the first step in this process. Suggestions welcomed.

    SYSCO NNE5 pointsBadges:
  • Is locating a data center on the top floor of your company bulding a cost effective solution?

    In the wake of floods warning i would specify the locating your DC on the first floors would be dangerous as " first hit ".

    Latin10 pointsBadges:
  • Disaster Recovery Site using SAN disk replication

    We are setting up a Disaster Recovery Site using SAN disk replication, for all our databases including Oracle; A uniform recovery solution for all IT applications. The Oracle Database will be replicated in the DR site SAN. Appreciate if you could enlighten on pitfalls? Is it a safe solution?

    ITKE354,295 pointsBadges:
  • Connectivity Testing

    Connectivity between DMZ Server and Application Server Application Server to Database Server Load Balancer to Application Server / Database Server Please suggest the sequence of Steps to check the connectivity between these layers (Telnet, FTP Tests etc.) which will be immensely helpful for...

    Vrajagop5 pointsBadges:
  • Digital document signatures for an enterprise

    Does anyone have a good enterprise solution for digital document signatures using Microsoft PKI/CA? I am looking for something that provides a good indication that a document has been digitally signed using a user-certificate generated by Microsoft AD CA (Server 2003). I have tried it in Word 2003...

    Labnuke9932,960 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following