Security Tag Directory

Featured Security Questions

  • layer 2 & layer 3 switch

    Hi All, what is the basic difference between layer 2 & layer 3 switch. how can configure layer 2 & layer3 managable switch

    Psharma11760 pointsBadges:
  • Decrypt data affected by ransomware

    Is there any possibilities to decypt data affected by ransomware (.crypz). If so, what is the tool I should use?

    balaaravind45 pointsBadges:
  • How do I DDoS a phone’s hotspot?

    How do I knock offline a phones hotspot? I got the software to do hit people offline but how do I do it to phones?

    josephmc5 pointsBadges:
  • Internet Explorer vs. Firefox

    Hello, I'm the Assistant Editor on I'm looking to start a discussion about what browser people are using and why. Also, is anyone considering switching from IE to Firefox, or are your plans to stay with IE? Here's some food for thought... As of Feb. 2005, an estimated 35...

    LMullen0 pointsBadges:
  • How to configure disaster recovery with BrightStor ARCserve Backup

    i wanna know how to make disaster recovery to the arcserve backup?

    ATrouble5 pointsBadges:
  • Disaster Recovery Checklist

    In the event there is physical/environmental disaster that impacts our data center, after it is safe to enter, what are best practices in the aftermath to protect media and avoid further damage? Not kidding, our current plan says dry and throw diskettes in a drawer.

    SHGrade15 pointsBadges:
  • Data Security System

    Can a hotel chain implement a single information security infrastructure for all its hotels?

    yvoncl15 pointsBadges:
  • Integrate MQ with DataPower

    How do I integrate MQ with DataPower?

    khaleelkhaja5 pointsBadges:
  • laptop login

    WinXP laptop, part of domain, when disconnected frm domain uses cached login. While disconnected, changed from domain member to workgroup member. :( Now login only has name/pwd text boxes - can't get domain selection box. Thus, can't login. How to get domain option back at login screen? (How to...

    ITDefensePatrol0 pointsBadges:
  • Network Connection Freezes

    For some reason, at random, among 20 PCs on my network, in the morning or during the day, the network connection stops responding for both intranet and internet communications. The only solution thus far is to remove the NIC from the Device Manager, reboot the PC, and let Windows XP Pro find the...

    DboiSOBE0 pointsBadges:
  • Allow regular user to unlock screensaver locked computer

    We have the problem that in a multiuser environment users either lock their computers, or have the screensaver automatically lock it, and leave the workstation. As a result, nobody else can use that computer. By default, only the current user or an adminstrator can unlock the computer. I would like...

    AdminGurl0 pointsBadges:
  • Creating a DMZ for remote desktop

    I'm working on a project where I need to create a DMZ for remote desktop access. Unfortunately, I was not in on the planning and can't order any hardware or software that wasn't already purchased. I was able to convince the team to use a dual firewall DMZ but they purchased two ASA 5515-x instead...

    JAliCO5 pointsBadges:
  • Protect myself from DDoS attacks

    How can I protect myself from DDoS attacks? Also, what about DNS Amplification attacks too?

    roshan24thakre5 pointsBadges:
  • Is it secure to connect two hosts from different environments (Production/DMZ) to the same storage and what is the BP?

    Can someone tell me if it's secure to connect two hosts from different environments (Production/DMZ) to the same storage and what is the BP?

    AbuMohammed5 pointsBadges:
  • Digital signature concepts in Java

    how can we perform digital signature concepts in j2me?

    VeeraR10 pointsBadges:
  • Digital or blind signature to avoid side channel attack in cloud computing

    I confused in one point should we choose normal digital signature or blind signature to avoid side channel attack in cloud computing? Can you help me please?

    students201550 pointsBadges:
  • Placing a intranet website in the DMZ. Safe?

    I have an old school Cisco network guy. He is claiming best practice for our company intranet website to be placed on the dmz. Is this safe? Knowing the intranet website doesn't need access from the outside in?

    dnddon5 pointsBadges:
  • How does the SSL decryption affects the PCI DSS compliance when data gets decrypted?

    I would tend to think that decrypted transactions are against PCI DSS - am I wrong on this? What would be good example of correct use of SSL decryption system which would not violate the PCI DSS requirements? Thanks for answers!

    krejpsky5 pointsBadges:
  • DDoS affecting my website

    If someone DDoS my website, will other websites residing in the server get affected to. I mean performance wise? Thanks! Johnson

    john0070075 pointsBadges:
  • Install a X.509 certificate

    How do I install a X.509 certificate?

    SunilBanani5 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

Thanks! We'll email you when relevant content is added and updated.