Security Tag Directory

Featured Security Questions

  • Secure login system for college database

    For my final year project I want to make a secure login system for my college database and lab system. So to implement such things, I want help of experts what can I do. I submitted my topic for Server Security system, but I don't have idea what to do. Please help me

    HarshalShende5 pointsBadges:
  • Decrypt a password

    I have to decrypt a password. Can someone help me?

    rifrif5 pointsBadges:
  • Is there any software which automatically removes data on mobile device if offline for a certain period?

    How do I delete data from my mobile if lost or has no network connection? I.E if the SIM card is removed or airplane mode? Is there any software which can do the same?

    rana123455 pointsBadges:
  • layer 2 & layer 3 switch

    Hi All, what is the basic difference between layer 2 & layer 3 switch. how can configure layer 2 & layer3 managable switch

    Psharma11760 pointsBadges:
  • Internet Explorer vs. Firefox

    Hello, I'm the Assistant Editor on SearchWindowsSecurity.com. I'm looking to start a discussion about what browser people are using and why. Also, is anyone considering switching from IE to Firefox, or are your plans to stay with IE? Here's some food for thought... As of Feb. 2005, an estimated 35...

    LMullen0 pointsBadges:
  • Decrypt data affected by ransomware

    Is there any possibilities to decypt data affected by ransomware (.crypz). If so, what is the tool I should use?

    balaaravind45 pointsBadges:
  • How do I DDoS a phone’s hotspot?

    How do I knock offline a phones hotspot? I got the software to do hit people offline but how do I do it to phones?

    josephmc5 pointsBadges:
  • How to configure disaster recovery with BrightStor ARCserve Backup

    i wanna know how to make disaster recovery to the arcserve backup?

    ATrouble5 pointsBadges:
  • Disaster Recovery Checklist

    In the event there is physical/environmental disaster that impacts our data center, after it is safe to enter, what are best practices in the aftermath to protect media and avoid further damage? Not kidding, our current plan says dry and throw diskettes in a drawer.

    SHGrade15 pointsBadges:
  • Data Security System

    Can a hotel chain implement a single information security infrastructure for all its hotels?

    yvoncl15 pointsBadges:
  • Integrate MQ with DataPower

    How do I integrate MQ with DataPower?

    khaleelkhaja5 pointsBadges:
  • laptop login

    WinXP laptop, part of domain, when disconnected frm domain uses cached login. While disconnected, changed from domain member to workgroup member. :( Now login only has name/pwd text boxes - can't get domain selection box. Thus, can't login. How to get domain option back at login screen? (How to...

    ITDefensePatrol0 pointsBadges:
  • Network Connection Freezes

    For some reason, at random, among 20 PCs on my network, in the morning or during the day, the network connection stops responding for both intranet and internet communications. The only solution thus far is to remove the NIC from the Device Manager, reboot the PC, and let Windows XP Pro find the...

    DboiSOBE0 pointsBadges:
  • Allow regular user to unlock screensaver locked computer

    We have the problem that in a multiuser environment users either lock their computers, or have the screensaver automatically lock it, and leave the workstation. As a result, nobody else can use that computer. By default, only the current user or an adminstrator can unlock the computer. I would like...

    AdminGurl0 pointsBadges:
  • Creating a DMZ for remote desktop

    I'm working on a project where I need to create a DMZ for remote desktop access. Unfortunately, I was not in on the planning and can't order any hardware or software that wasn't already purchased. I was able to convince the team to use a dual firewall DMZ but they purchased two ASA 5515-x instead...

    JAliCO5 pointsBadges:
  • Protect myself from DDoS attacks

    How can I protect myself from DDoS attacks? Also, what about DNS Amplification attacks too?

    roshan24thakre5 pointsBadges:
  • Is it secure to connect two hosts from different environments (Production/DMZ) to the same storage and what is the BP?

    Can someone tell me if it's secure to connect two hosts from different environments (Production/DMZ) to the same storage and what is the BP?

    AbuMohammed5 pointsBadges:
  • Digital signature concepts in Java

    how can we perform digital signature concepts in j2me?

    VeeraR10 pointsBadges:
  • Digital or blind signature to avoid side channel attack in cloud computing

    I confused in one point should we choose normal digital signature or blind signature to avoid side channel attack in cloud computing? Can you help me please?

    students201550 pointsBadges:
  • Placing a intranet website in the DMZ. Safe?

    I have an old school Cisco network guy. He is claiming best practice for our company intranet website to be placed on the dmz. Is this safe? Knowing the intranet website doesn't need access from the outside in?

    dnddon5 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

Thanks! We'll email you when relevant content is added and updated.

Following