Security Tag Directory

Featured Security Questions

  • Features around URL Filtering with Forefront Threat Management Gateway

    Can you explain the new features around URL filtering within Forefront Threat Management Gateway? This question is from the Microsoft Live Chat which took place on July 13th.

    ITKE350,300 pointsBadges:
  • Is Forefront Unified Access Gateway (UAG) 2010 supported on Firefox?

    Is Forefront Unified Access Gateway (UAG) 2010 supported on Firefox? This question is from the Microsoft Live Chat which took place on July 13th.

    ITKE350,300 pointsBadges:
  • How does Forefront compare with its McAfee and Symantec counterparts?

    How does Forefront compare with its McAfee and Symantec counterparts? This question is from the Microsoft Live Chat which took place on July 13th.

    ITKE350,300 pointsBadges:
  • Encrypting or locking bat file with passwords in it

    Can we encrypt or lock a bat file from being read as it has passwords in it?

    TeachMeIT975 pointsBadges:
  • Forefront Unified Access Gateway Functionality

    Can you tell us about the UAG Tracing functionality?  This question is from the Microsoft Live Chat which took place on July 13th.

    ITKE350,300 pointsBadges:
  • How does Threat Managament Gateway integrate with Windows Branch Cache?

    How does Forefront Threat Management Gateway (TMG) 2010 integrate with Windows Branch Cache? This question is from the Microsoft Live Chat which took place on July 13th.

    ITKE350,300 pointsBadges:
  • Does Forefront Unified Access Gateway require Win Server 2008 R2?

    Does Forefront Unified Access Gateway require Win Server 2008 R2?  Are there other systems requirements? This question is from the Microsoft Live Chat which took place on July 13th.

    ITKE350,300 pointsBadges:
  • How to encrypt an .exe file into a .Jpeg file?

    Hello guys. I have a question. I want to know how can we encrypt a .exe file into a .JPEG file? Its like, when we open the image file, the .exe file should run on its own. I know there are some complicated encryption methods but are there any simple methods? Can we do that? Are there any threats to...

    Kalyan20088745 pointsBadges:
  • Why do organizations fingerprint?

    When I came to the USA, someone made me do a fingerprint (which I have no knowledge of). Today, anywhere I go to find work, the fingerprint will come up. So I don't know what to do.

    Annankunde15 pointsBadges:
  • Is IP Address filtering really secure?

    We're planning to deploy an internal application with a ton of sensitive data and we're becoming very worried security wise. I suggested to keep it on our internal network but I was vetoed. Inside of the app, we programmed it to only respect requests if they come from an internal IP address...

    ITKE350,300 pointsBadges:
  • Is Forefront client security server compatible with Server 2008 R2?

    Is Forefront client security server compatible with Server 2008R2? This question is from the Microsoft Live Chat which took place on July 13th.

    ITKE350,300 pointsBadges:
  • Protecting PDF Files

    I got some documents printed the other day at a local print shop. I noticed that they moved my PDF from my flash drive to their desktop. Is there a way to protect my files without using a password? Is there a way to make a file open once and after that encrypt it?

    ITKE350,300 pointsBadges:
  • Egress Filtering

    What are the pros and the cons of egress filtering when referring to the network of a medium-sized software business? From what I understand the use of egress filtering will cause issues for some users as it requires policy changes for all new software. But does that annoyance outweigh the...

    ITKE350,300 pointsBadges:
  • Under-the-radar enterprise security threats

    Which enterprise security threat do you think has gone under the radar? As an editor on SearchSecurity.com, I'm interested to hear what you think. Our favorite response will win some great, free security training books. http://searchsecurity.techtarget.com/generic/0,295582,sid14_gci1368789,00.html

    WHurley5 pointsBadges:
  • Etherchannel with different port shapers

    I want to implement a new solution in my network. I want to make an Etherchannel over a STM1 radio link. I don't have Gi ports available so I want to use two aggregated FaEth ports. But I'm thinking of using different service policy on each interface. So, I want to put a service policy with a port...

    bogdanmucuta15 pointsBadges:
  • Monitor Internet bandwidth

    Good day, We are using Windows 2000 Small Business Server in our organization with Exchange, DNS and ISA server configured. 1. I want to monitor the internet usage by the users. 2. I want to take a report on monthly or daily basis how much MB/GB utilized by each user. Thanks for your reply in...

    GiriPrasad0 pointsBadges:
  • EtherChannel protocol

    What protocol does EtherChannel uses to communicate between switches, routers and servers?

    Modu5 pointsBadges:
  • EtherChannel: Port to select frame

    If I have 5 link between 2 Switch and I use EtherChannel, which port is select to send the frame? Or we have & or 6 link?

    a3moonii35 pointsBadges:
  • Is Blackberry 10 the best choice for enterprise in terms of BYOD?

    Jeff Holleran, Blackberry's senior director of enterprise product management, claims that the new Blackberry 10 operating system in conjunction with the BlackBerry Enterprise Service 10 provides the best mobile and BYOD system for both owners and companies.  Do you think he’s right and do you...

    Chris Leonard4,300 pointsBadges:
  • Share network file

    Hi friends...May I know how to make a file read only for everyone expect admin can control it. Thank you.

    wltan70200375 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following