Security Tag Directory

Featured Security Questions

  • How do I DDoS a phone’s hotspot?

    How do I knock offline a phones hotspot? I got the software to do hit people offline but how do I do it to phones?

    josephmc5 pointsBadges:
  • Internet Explorer vs. Firefox

    Hello, I'm the Assistant Editor on SearchWindowsSecurity.com. I'm looking to start a discussion about what browser people are using and why. Also, is anyone considering switching from IE to Firefox, or are your plans to stay with IE? Here's some food for thought... As of Feb. 2005, an estimated 35...

    LMullen0 pointsBadges:
  • How to configure disaster recovery with BrightStor ARCserve Backup

    i wanna know how to make disaster recovery to the arcserve backup?

    ATrouble5 pointsBadges:
  • Disaster Recovery Checklist

    In the event there is physical/environmental disaster that impacts our data center, after it is safe to enter, what are best practices in the aftermath to protect media and avoid further damage? Not kidding, our current plan says dry and throw diskettes in a drawer.

    SHGrade15 pointsBadges:
  • Data Security System

    Can a hotel chain implement a single information security infrastructure for all its hotels?

    yvoncl15 pointsBadges:
  • Integrate MQ with DataPower

    How do I integrate MQ with DataPower?

    khaleelkhaja5 pointsBadges:
  • laptop login

    WinXP laptop, part of domain, when disconnected frm domain uses cached login. While disconnected, changed from domain member to workgroup member. :( Now login only has name/pwd text boxes - can't get domain selection box. Thus, can't login. How to get domain option back at login screen? (How to...

    ITDefensePatrol0 pointsBadges:
  • Network Connection Freezes

    For some reason, at random, among 20 PCs on my network, in the morning or during the day, the network connection stops responding for both intranet and internet communications. The only solution thus far is to remove the NIC from the Device Manager, reboot the PC, and let Windows XP Pro find the...

    DboiSOBE0 pointsBadges:
  • Allow regular user to unlock screensaver locked computer

    We have the problem that in a multiuser environment users either lock their computers, or have the screensaver automatically lock it, and leave the workstation. As a result, nobody else can use that computer. By default, only the current user or an adminstrator can unlock the computer. I would like...

    AdminGurl0 pointsBadges:
  • Creating a DMZ for remote desktop

    I'm working on a project where I need to create a DMZ for remote desktop access. Unfortunately, I was not in on the planning and can't order any hardware or software that wasn't already purchased. I was able to convince the team to use a dual firewall DMZ but they purchased two ASA 5515-x instead...

    JAliCO5 pointsBadges:
  • Protect myself from DDoS attacks

    How can I protect myself from DDoS attacks? Also, what about DNS Amplification attacks too?

    roshan24thakre5 pointsBadges:
  • Is it secure to connect two hosts from different environments (Production/DMZ) to the same storage and what is the BP?

    Can someone tell me if it's secure to connect two hosts from different environments (Production/DMZ) to the same storage and what is the BP?

    AbuMohammed5 pointsBadges:
  • Digital signature concepts in Java

    how can we perform digital signature concepts in j2me?

    VeeraR10 pointsBadges:
  • Digital or blind signature to avoid side channel attack in cloud computing

    I confused in one point should we choose normal digital signature or blind signature to avoid side channel attack in cloud computing? Can you help me please?

    students201550 pointsBadges:
  • Placing a intranet website in the DMZ. Safe?

    I have an old school Cisco network guy. He is claiming best practice for our company intranet website to be placed on the dmz. Is this safe? Knowing the intranet website doesn't need access from the outside in?

    dnddon5 pointsBadges:
  • How does the SSL decryption affects the PCI DSS compliance when data gets decrypted?

    I would tend to think that decrypted transactions are against PCI DSS - am I wrong on this? What would be good example of correct use of SSL decryption system which would not violate the PCI DSS requirements? Thanks for answers!

    krejpsky5 pointsBadges:
  • DDoS affecting my website

    If someone DDoS my website, will other websites residing in the server get affected to. I mean performance wise? Thanks! Johnson

    john0070075 pointsBadges:
  • Install a X.509 certificate

    How do I install a X.509 certificate?

    SunilBanani5 pointsBadges:
  • Certificate not signed by trusted authority

    We have been been communicating with Twitter from our iSeries. Recently Twitter increased their security and now required a digital certificate. We followed all the setup instructions but get this error on the green screen.  gsk_secure_soc_init() failed with rc = 6000 and errno = 0. 8 rc of 6000...

    WoodEngineer6,955 pointsBadges:
  • DDoS mitigation for Windows Server 2008 R2

    We are doing our PCI compliance scans and our Windows Server 2008 R2 was hit by a Nessus Plugin ID. Should I be worried? It has DDoS in the title so that scares me. Here's what it says: Plugin ID: 35450 Name: DNS Server Spoofed Request Amplification DDoS Synopsis: The remote DNS server could be...

    ITKE434,585 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

Thanks! We'll email you when relevant content is added and updated.

Following