Security Tag Directory

Featured Security Questions

  • Windows Decrypt help needed

    I have formatted my Harddisk without backing up my encryption key. Now, I have problems opening the file which encrypted by me old OS. Can anyone advice me how to overcome this situation?

    Kesevan45 pointsBadges:
  • Need Storage encrypted solution

    Hi, I hope you can give me an option to have encrypted data at storage level, preferable SAN but if not possible NAS can be adopted. Must be 256 bit encrypted, this is required for call recording compliance. Thanks in advance.

    Xtornet5 pointsBadges:
  • Network alerts for critical conditions

    How can I create an alert on my network to email or SMS me on critical conditions such as down gateways, DNS servers, DOS attacks and the such? Is this available to Windows 2008 Server? What options will I have and is there a walk-through or something about it online?

    ITKE351,880 pointsBadges:
  • File Member Select & Encryption in AS/400

    Two questions here. I have been querying a lot of data out of our database, however I have ran into two issues I'm unsure how to solve. 1.) I'm able to find the referenced table, however this relies on a file. RUNQRY QRY(*LIBL/*N) QRYFILE((SCDATA/SCATRNTL username)) I would like to replicate this...

    kparker25 pointsBadges:
  • Tracking Laptop Users

    Does anyone have a recommendation for a good software program to track internet content for lap top users when not connected to the network? Specifically, what software does the best tracking when the users connects back to the network.

    Gamrey5 pointsBadges:
  • Encryption Form SQL Server 2000

    I want to transfer data from one database to another database both the databases are on SQL Server 2000. I want to transfer the data in encryption form. How do I do it? Regards, Sahil

    Maruf245 pointsBadges:
  • Tracking when a user has logged on

    As we are having the following problem in the office (small company without an IT person) I was wondering if it is possible to find out when someone last logged on to their PC. System details Email: Exchange server (externally hosted) PC OS: XP Productivity SW: Office 2007 Issue Someone is logging...

    Squashbug5 pointsBadges:
  • NAS or SAN?

    We have a need to run numerous virtual servers from a NAS/SAN. The questions is, which should we choose? THe product we support (Citrix XenServer) supports either for backend virtual system storage and can run VM's from either. Currently, our needs are small. We have about 10 virtual servers that...

    Isdpcman20 pointsBadges:
  • BitLocker and Business versions of Windows

    BitLocker drive encryption is intriguing and important, but it's available only in Vista and Win 7 Ultimate and Corporate editions. Since these are the most expensive versions of the OS, most smaller companies use the Business version of Windows--what are some encryption options for them? As a...

    SearchMidmarketSecurityATE150 pointsBadges:
  • AES encyption: More secure than SHA1?

    I know this is more of a curiosity but I wanted to get some expert opinions on this. I recently heard someone recommend stepping up from md5ing (not to SHA1) but to AES encrypting the password, which would use itself as the key. Does anyone have any recommendations on if that would be more or less...

    ITKE351,880 pointsBadges:
  • What is SHA-1 and MD-5 encryption?

    What is SHA-1 and MD-5 encryption?

    Jbt5 pointsBadges:
  • Mail Tracking in Exchange 2003

    I am the administrator of Exchnage 2003. How can i read all user's incomming and outcomming mail fromthe server????

    Hukam5 pointsBadges:
  • How do I encrypt an email?

    I want to send an e-mail and I want it encrypted so it can't be sent to others.

    Secure4me10 pointsBadges:
  • DOS Attact Message or Just a Simple Query”?

    I have checked firewall alert message everyday from my organization firewall equipment, and it returns an alert message "anomaly: udp_src_session, 1001 > threshold 1000, repeated 214 times" Starting from 172.10.2.45:51158 to 210.181.1.24:53. I wanna know whether it's really infected and...

    RedJason5 pointsBadges:
  • E-mail hacking

    How can I hack my own e-mail address? Is there software available for this (commercial or freeware)?

    Brainstorm225 pointsBadges:
  • AS400 password encryption

    Hi, how can I verify the password encryption method used by the AS/400/iSeries machine. Thanks.

    Jerico125 pointsBadges:
  • Encrypting or locking bat file with passwords in it

    Can we encrypt or lock a bat file from being read as it has passwords in it?

    TeachMeIT975 pointsBadges:
  • DOS Attack

    Hello there, This is Faisal Rafiq, I have a problem after Dos attack. I got an error "ISA Server detected routes through the network adapter live that do not correlate with the network to which this network adapter belongs." Thanks & Regards,

    239069370 pointsBadges:
  • ISA server and Web monitoring configuration confusion

    From a reader: I'm installing Web monitoring software and Microsoft ISA server so that we can get a handle on employee surfing and lock down troublesome sites. Now we already have a network firewall installed that isn't going anywhere. Should I set up ISA as a secondary firewall? Any alternative...

    SearchMidmarketSecurityATE150 pointsBadges:
  • Evaluating security level in our system

    Good day! Could you help detect encryption type (it's very important for us to evaluate security level in our system) Hash code: 5e2f736ea4ab4eb4 Regards, Igor

    technetwin15 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following