Security Tag Directory

Featured Security Questions

Technical College vs. University
Hello all- Would it be more beneficial to attend a technical college or university? A certain technical college, ECPI ( in VA, has sparked my interest because they advertise ‘they meet with some industry experts to discuss tech trends and what education needs to be put out to keep up with today’s skills.’ I want...

Answer Question   |  April 11, 2014  4:20 PM
Career Development, CCNA, Certifications, Data analysis, Data center operations, Data mining/analysis, Data warehousing applications, DataCenter, Development, DHCP, DNS, E-mail applications, Ecommerce applications, ERP, Exchange 2000, Exchange 2003, Exchange 5.5, Hardware, Help Desk, IBM, Knowledge management applications, Lotus Domino, Mail protocols, Microsoft Exchange, Microsoft Windows, Network management software, Networking, Networking certifications, Networking Equipment, Networking services, Oracle, Outlook, Security, Security management, Systems management software, Tech support, Vendors
asked by:
0 pts.

How to setup Sonic Wall NSA 3500 as NTP server
I would like to set the NSA 3500 as the NTP server for internal devices such as switches. The version of code is

Answer Question   |  April 2, 2014  5:49 PM
NTP, NTP Configuration, SonicWALL, Sonicwall NSA 3500
asked by:
5 pts.

Wiping hard drives in 100 PCs
We are donating 100 PCs. How can I quickly and effectively wipe all their hard drives? I have looked into Mban and it looks promising but would I be better doing that or pulling all the drives and formatting multiple ones at the same time? What are best practices for doing this?

Answer Question   |  April 2, 2014  2:22 PM
Backup hardware, Backup storage, HARD drive, Hard drive erasure, Security in 2010, Storage, Storage management
asked by:
1,110 pts.

Retrieving original MAC address
Our group is tasked with with retrieving the active MAC address for our Windows PCs. Here’s the code we’re using: private static string macId() { return identifier("Win32_NetworkAdapterConfiguration", "MACAddress", "IPEnabled"); } private static string identifier(string wmiClass, string wmiProperty, string wmiMustBeTrue) { string result = ""; System.Management.ManagementClass mc = new System.Management.ManagementClass(wmiClass); System.Management.ManagementObjectCollection moc = mc.GetInstances(); foreach (System.Management.ManagementObject...

Answer Question   |  March 26, 2014  12:00 PM
MAC address, Networking, Spoofing
asked by:
54,755 pts.

What is Port 443? Why do SSL VPNs make use of it?
I am setting up a Web SSL VPN for remote access across my WAN. Can someone explain why SSL VPNs use Port 443? Can I use any other port?

Answer Question   |  March 16, 2014  7:10 PM
Network security, Port 443, Ports, Remote access, SSL, Ssl vpn, VPN, WAN
500 pts.

Forgot Password using SiteMinder
Can anyone of you guide in implementing the “forgot password” option using siteminder

Answer Question   |  February 27, 2014  10:07 PM
Password, SiteMinder
asked by:
5 pts.

Linux Security
Will Sophos anti-virus, security, etc. software work with Linux operating system?

Answer Question   |  February 14, 2014  2:32 PM
Antivirus, Linux, Sophos
asked by:
5 pts.

shdocpv.dll – virus – hijack problem
Hi, I’m sorry if I had chosen the wrong recipient. I am running Windows 2000. When I open my browser (IE 6.0) I get this: res://shdocpv.dll/blank.htm Or res://C:WinntSystem32shdocpv.dllsecurity.htm Please help me to get rid of this. Thanks!

Answer Question   |  January 30, 2014  6:23 PM
backdoors, Current threats, Hacking, human factors, Intrusion management, Servers, Spyware, Trojans, Viruses, Windows 2000 Server, worms
asked by:
0 pts.

Unauthorized Remote Lan Login on Netgear Router on Comcast
I have been searching for an answer all over the place and hope someone can help me. I even called comcast, but they had no suggestions beyond those I have already tried. I have WPA/TKIP security on my network, Norton, Windows defender, Spybot, and a few other security programs. I am running Windows XP. I...

Answer Question   |  January 15, 2014  7:52 PM
Comcast, LAN access from Chinese IP, LAN Security, Netgear router, Security, SPYING, Wan security
asked by:
15 pts.

Peachtree suitability for NRDF
WE are at present using an old version of ACCPAC windows to process our accounting entries. We wish to replace it with a suitable version of Peachtree and need some advice. We are providers of micro-finance and Business Training (Diploma to MBA). We employ 13 permanent employees and  a number of part time facilitators for...

Answer Question   |  January 6, 2014  4:27 PM
Security accessment
asked by:
5 pts.

Using Network Access Control to limit Internet access on a specific few machines
How can we use Windows 2008’s Network Access Control to limit intern’s computers from getting to the Internet? Where is this feature setup and do we need a client on the computers or does AD take care of this?

Answer Question   |  December 23, 2013  3:14 PM
NAC, Network Access Control, Security in 2010, Windows, Windows Server 2008, Windows Server 2008 R2, Windows Server 2008 R2 Support
asked by:
9,860 pts.

Vulnerability Test analysis
my project is based on the topic vulnerability test analysis of a computer system.can anyone please tell me what to do and where to start..give me some useful ideas to proceed

Answer Question   |  December 18, 2013  9:00 AM
*system, analysis, computer, computer system, IP address, Mac, project, Security, Security Analyzer, Security assessment, test, vulnerability, Vulnerability Assessment & Audit, vulnerability scanning, Windows
asked by:
60 pts.

Information Security Degrees
As an IT security professional, does it really matter which school a degree is earned from? For example, I have two schools that are both online and regionally accredited: American Military University and University of Maryland University College. AMU offers a B.S. in Information Systems Security, and UMUC offers B.S. in Information Assurance. UMUC’s program,...

Answer Question   |  December 12, 2013  10:21 PM
american military university, amu, Degree, information assurance, Information security careers, Information Systems Security, IT careers, IT education, nsa cae, Security careers, umuc, university of maryland university college
asked by:
30 pts.

Domain security policy and domain controller security policy
What is the difference between domain security policy and domain controller security policy?

Answer Question   |  December 12, 2013  6:46 AM
Domain Controller, Network Security Management, Security policies
asked by:
5 pts.

Information security questions
Hi everyone, I am new to this field as a 2nd career, previously was in mfg. engineering for a lot of years. Need some help with the following questions for a class I am taking. Need to get feedback with professionals in the field to determine what issues they think are important for information security....

Answer Question   |  December 12, 2013  1:04 AM
Compliance, configuration, CRM, Disaster Recovery, patching, PEN testing, Platform Security, Policies, Risk management, Security, Security Program Management, vulnerability management
asked by:
0 pts.

Exporting Active Directory server security log
How can I export the data from a Windows Active Directory server’s security log to create a graph of who logged in and out at what times?

Answer Question   |  December 12, 2013  1:55 PM
Active Directory, Active Directory security, Security logs, Server Security, Windows administration
asked by:
975 pts.

Critical Error in Security Log
All, I manage a Windows 2003 Small Business Server Network with 9 clients. The server provides all network services. We use Logon/logoff, shared storage, and print server functions. We do not use exchange except for the server reporting tool. We do use about 4 instances of SQL. All clients are Windows XP Professional patched to...

Answer Question   |  December 12, 2013  7:08 AM
Biometrics, configuration, DataCenter, Desktops, Digital certificates, Identity & Access Management, Management, Microsoft Systems Management Server, Microsoft Windows, OS, Patch management, patching, PEN testing, Platform Security, provisioning, Security, Security tokens, Servers, Single sign-on, Software, SQL Server, Tech support, vulnerability management
asked by:
0 pts.

Road to become a Security Auditor?
Hi, I am really confused about way to follow to become a Security Auditor… and the opportunities it has in future.. esp. in India? Currently I am working as a Security Consultant but dealing only with Security Related products including Firewalls, NMS, IPS etc and not Standards like BS7799, ISO27001, CoBit etc. Being in Networking...

Answer Question   |  December 12, 2013  8:22 AM
CCIE, Certified Information Systems Auditor, CISA, Cisco Certified Internetwork Expert, Information Security Management System, ISMS, IT careers, Security auditing, Security Auditor, Security audits, Security careers
asked by:
5 pts.

Exporting Windows server 2003 SAM database for external security audit
We need to export the windows server 2003 SAM database to a standalone server for an external security audit. Where do I find this file or how can I export the data needed?

Answer Question   |  December 12, 2013  2:28 PM
SAM, Security Accounts Manager database, Security Audit, Windows Security, Windows Server 2003, Windows Server 2003 security
asked by:
1,110 pts.

Checklists for Router, Firewall and Switch security
I have recently been shifted to Information security audit department. I need some checklists to check the security compliance for Router, Switch, and Firewall. Please provide me some checklists to audit the same.

Answer Question   |  December 12, 2013  6:03 AM
Audit and compliance, Auditing (compliance), Compliance checklist, ISMS, Security audits, Security compliance
asked by:
130 pts.

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: