Security Tag Directory

Featured Security Questions

  • Endpoint security – Data leakage

    Sir, How do you do data set, data classification, model, methodology, and strategic plan to prevent data leakage.

    shivakumarat5 pointsBadges:
  • Data Quality “Chicken and Egg” problem with Data Security

    Our Data Quality team has access to the data (considering that Data Quality, Data Security and Data Governance are all belong to Data Management team): Security matrix for Data Quality team: One of the Data Quality processes is to ensure the security of the data. At the same time Data Governance...

    natebit455 pointsBadges:
  • Certificate not signed by trusted authority

    We have been been communicating with Twitter from our iSeries. Recently Twitter increased their security and now required a digital certificate. We followed all the setup instructions but get this error on the green screen.  gsk_secure_soc_init() failed with rc = 6000 and errno = 0. 8 rc of 6000...

    WoodEngineer7,650 pointsBadges:
  • How to determine password expiration

    Recently this iSeries user wrote in with a question about password expiration. He writes, "How can I tell if a user's password does not expire? I've used the user profile report, but all it gives me for expiration values are 0's or -1's for all of the users." Can you help? Michelle Davidson Editor...

    MichelleDavidson515 pointsBadges:
  • How do I DDoS a phone’s hotspot?

    How do I knock offline a phones hotspot? I got the software to do hit people offline but how do I do it to phones?

    josephmc5 pointsBadges:
  • Decrypt Ubuntu file in Windows 10

    Not sure if this is the right place to ask this question but I thought I would try. I have both Ubuntu and Windows 10. I also have a file that's encrypted in Ubuntu. I have the public key too. Can I decrypt this file in Windows 10?

    ITKE1,051,065 pointsBadges:
  • How to verify digital signature in Microsoft Outlook 2016

    For my job, I have Microsoft Outlook 2016. Would there be a way for me to verify our client's digital signature? How can I do that?

    ITKE1,051,065 pointsBadges:
  • Data security in cloud computing

    Just asking for your favour for the information regarding how the following process mentioned herewith is maintained/implemented in existing Cloud architectures.Whether the following encryption/decryption of hardware related information for security aspects are followed or not YES/No in existing...

    Shweta98315 pointsBadges:
  • How to evaluate database security tools in terms of security

    I want to evaluate these tools, by using something like protection profiles or common criteria, but I don't know how can I find some checkpoints for evaluation. Can anybody help me?

    Panizir5 pointsBadges:
  • Auditing for database security

    Why is a database monitor and auditing critical to ensure database security?

    sweetpeajd120 pointsBadges:
  • Internet Explorer vs. Firefox

    Hello, I'm the Assistant Editor on SearchWindowsSecurity.com. I'm looking to start a discussion about what browser people are using and why. Also, is anyone considering switching from IE to Firefox, or are your plans to stay with IE? Here's some food for thought... As of Feb. 2005, an estimated 35...

    LMullen0 pointsBadges:
  • Secure login system for college database

    For my final year project I want to make a secure login system for my college database and lab system. So to implement such things, I want help of experts what can I do. I submitted my topic for Server Security system, but I don't have idea what to do. Please help me

    HarshalShende5 pointsBadges:
  • Decrypt a password

    I have to decrypt a password. Can someone help me?

    rifrif5 pointsBadges:
  • Is there any software which automatically removes data on mobile device if offline for a certain period?

    How do I delete data from my mobile if lost or has no network connection? I.E if the SIM card is removed or airplane mode? Is there any software which can do the same?

    rana123455 pointsBadges:
  • layer 2 & layer 3 switch

    Hi All, what is the basic difference between layer 2 & layer 3 switch. how can configure layer 2 & layer3 managable switch

    Psharma11760 pointsBadges:
  • Decrypt data affected by ransomware

    Is there any possibilities to decypt data affected by ransomware (.crypz). If so, what is the tool I should use?

    balaaravind45 pointsBadges:
  • How to configure disaster recovery with BrightStor ARCserve Backup

    i wanna know how to make disaster recovery to the arcserve backup?

    ATrouble5 pointsBadges:
  • Disaster Recovery Checklist

    In the event there is physical/environmental disaster that impacts our data center, after it is safe to enter, what are best practices in the aftermath to protect media and avoid further damage? Not kidding, our current plan says dry and throw diskettes in a drawer.

    SHGrade15 pointsBadges:
  • Data Security System

    Can a hotel chain implement a single information security infrastructure for all its hotels?

    yvoncl15 pointsBadges:
  • Integrate MQ with DataPower

    How do I integrate MQ with DataPower?

    khaleelkhaja5 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

Thanks! We'll email you when relevant content is added and updated.

Following