Security Tag Directory

Featured Security Questions

  • How can I connect SDK With C#?

    Could you tell me how to connect SDK with C#?! My SDK is gruail.

    chant18130 pointsBadges:
  • Connect fingerprint machine with own code

    Haw I can connect my own code with the fingerprint machine, my fingerprint machine is (andy) and I add sdk to my code in C#. Please help me.

    chant18130 pointsBadges:
  • Procedures for a new area

    We are a company where we have experience on network remote administration and now we have open a new area, The area of security. Now I need to start to make new procedures like when a new customer come to us and ask if we can handle the security for his network. I need to know if some one can...

    Millan0 pointsBadges:
  • Which Forefront Products should a small business consider?

    As a smaller business organization, which Forefront products should I be considering? This question is from the Microsoft Live Chat which took place on July 13th.

    ITKE357,100 pointsBadges:
  • Uninstall Previous AV Products for Microsoft Forefront Installation

    Are there tools/quick tips I can access to help uninstall previous AV products? This question is from the Microsoft Live Chat which took place on July 13th.

    ITKE357,100 pointsBadges:
  • Decrypt encrypted folder from Microsoft Windows

    Good day, Facing problem to decrypt encrypted folder from Windows. I have formatted previous OS which was used to encrypt the folder. Client didn't inform me about the encryption that they have done this folder and they are non PC literate too. Didn't have the key exported also. How can I decrypt...

    Kesevan45 pointsBadges:
  • URL Filtering

    I'm a network admin for a K-12 district in New Jersey. I was wondering what some other districts across the US are using for a URL/Content filter solution. We currently have Websense 5.5 running onbox with a Cisco Content Engine and are looking at other alternatives.

    Obnetadmin5 pointsBadges:
  • Shared folder server activity

    What would be the best way to log data for files in a shared directory (and sub-directories) on a server? The type of information needed would be something like this: File accessed By whom the file was accessed Date/Time opened Date/Time closed (if possible) Date/Time file saved Everything is a...

    Memonboys45 pointsBadges:
  • System Requirements for Forefront Threat Management 2010

    What are the systems requirements around Forefront Threat Management 2010? This question is from the Microsoft Live Chat which took place on July 13th.

    ITKE357,100 pointsBadges:
  • Windows Decrypt help needed

    I have formatted my Harddisk without backing up my encryption key. Now, I have problems opening the file which encrypted by me old OS. Can anyone advice me how to overcome this situation?

    Kesevan45 pointsBadges:
  • Wireshark/Ethereal Retransmission

    Can anyone explain the mechanisms for retransmission and fast retransmission in Wireshark/ethereal?

    Tbolitho10 pointsBadges:
  • Upgrade to full Forefront Client Security

    How complex is the upgrade from trial to full FCS? This question is from the Microsoft Live Chat which took place on July 13th.

    ITKE357,100 pointsBadges:
  • What fault tolerance does RAID offer?

    What is fault tolerance and RAID 5? And what does RAID 1 offer for fault tolerance?

    Dfv5 pointsBadges:
  • Updates in Reporting for FTMG

    I’ve heard that reporting can be very admin focused - Are there any recent updates in reporting capabilities for FTMG? This question is from the Microsoft Live Chat which took place on July 13th.

    ITKE357,100 pointsBadges:
  • Tracking Laptop Users

    Does anyone have a recommendation for a good software program to track internet content for lap top users when not connected to the network? Specifically, what software does the best tracking when the users connects back to the network.

    Gamrey5 pointsBadges:
  • What is Windows Live One care?

    What is Windows Live One care? This question is from the Microsoft Live Chat which took place on July 13th.

    ITKE357,100 pointsBadges:
  • Etherchannel with different port shapers

    I want to implement a new solution in my network. I want to make an Etherchannel over a STM1 radio link. I don't have Gi ports available so I want to use two aggregated FaEth ports. But I'm thinking of using different service policy on each interface. So, I want to put a service policy with a port...

    bogdanmucuta15 pointsBadges:
  • Issue with Threat Mamagament Gateway blocking Windows Server Update Services (WSUS)

    Has anyone had issue with Threat Management Gateway blocking Windows Server Update Services (WSUS)?  What can I do? This question is from the Microsoft Live Chat which took place on July 13th.

    ITKE357,100 pointsBadges:
  • How to open encrypted file

    I have formatted one PC, after re-installing all software system won't allow to open all excel,word files showing "file access denied...encrypted file or read only", though I logged through administrator with all rights. All files was encrypted by earlier user and created certificate, before...

    Pva15 pointsBadges:
  • Help with errors

    I am getting critical system error announcements with my computer and says I need to get it fixed. It says I need to download some kind of repair site. Well I did and it told me the problems I have but in order to fix the problem I have to pay for it. I dont have the money right now. According to...

    Virginiakay5 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following