Security Tag Directory

Featured Security Questions

  • layer 2 & layer 3 switch

    Hi All, what is the basic difference between layer 2 & layer 3 switch. how can configure layer 2 & layer3 managable switch

    Psharma11760 pointsBadges:
  • Internet Explorer vs. Firefox

    Hello, I'm the Assistant Editor on I'm looking to start a discussion about what browser people are using and why. Also, is anyone considering switching from IE to Firefox, or are your plans to stay with IE? Here's some food for thought... As of Feb. 2005, an estimated 35...

    LMullen0 pointsBadges:
  • Ipnat.sys related error on Win2003 Server

    Happy 2006 to you all! One of my customers is getting a strange error since someone disabled (deleted actually!!) the Terminal Server service on their Windows 2003 Server SP1. The error that pops up is: "Windows Firewall cannot run because another program or service is running that might use the...

    Hedgehog0 pointsBadges:
  • Hacking for beginner

    Which Macbook is best for hacking?

    HNYBGR78785 pointsBadges:
  • Uninstallation of Norton WMI update

    Respected recipient, I am currently having a trouble in uninstalling Norton anti-virus VMI update. My company got Norton anti virus software installed on the system from the Norton anti virus software CD and it was not Norton system works, just the Norton anti virus software. After somedays, it...

    Nishant70 pointsBadges:
  • Network Connection Freezes

    For some reason, at random, among 20 PCs on my network, in the morning or during the day, the network connection stops responding for both intranet and internet communications. The only solution thus far is to remove the NIC from the Device Manager, reboot the PC, and let Windows XP Pro find the...

    DboiSOBE0 pointsBadges:
  • How to encrypt an .exe file into a .Jpeg file?

    Hello guys. I have a question. I want to know how can we encrypt a .exe file into a .JPEG file? Its like, when we open the image file, the .exe file should run on its own. I know there are some complicated encryption methods but are there any simple methods? Can we do that? Are there any threats to...

    Kalyan20088745 pointsBadges:
  • Connect fingerprint machine with own code

    Haw I can connect my own code with the fingerprint machine, my fingerprint machine is (andy) and I add sdk to my code in C#. Please help me.

    chant18130 pointsBadges:
  • Fault tolerance configuration on ESXi host BIOS

    If Fault Tolerance will be configured, which statement is correct about the ESXi host BIOS?

    kgg920610 pointsBadges:
  • How to offer a high availability database environment

    Can I configure VMware Fault Tolerance, or another VMware technology, to host an active DB2 database at one data center, and host a standby DB2 database at a second data center? Applications would access the primary DB when available, and then access the standby DB if the primary failed. The data...

    JimInTexas5 pointsBadges:
  • How can I connect SDK With C#?

    Could you tell me how to connect SDK with C#?! My SDK is gruail.

    chant18130 pointsBadges:
  • Procedures for a new area

    We are a company where we have experience on network remote administration and now we have open a new area, The area of security. Now I need to start to make new procedures like when a new customer come to us and ask if we can handle the security for his network. I need to know if some one can...

    Millan0 pointsBadges:
  • Which Forefront Products should a small business consider?

    As a smaller business organization, which Forefront products should I be considering? This question is from the Microsoft Live Chat which took place on July 13th.

    ITKE440,540 pointsBadges:
  • Uninstall Previous AV Products for Microsoft Forefront Installation

    Are there tools/quick tips I can access to help uninstall previous AV products? This question is from the Microsoft Live Chat which took place on July 13th.

    ITKE440,540 pointsBadges:
  • Decrypt encrypted folder from Microsoft Windows

    Good day, Facing problem to decrypt encrypted folder from Windows. I have formatted previous OS which was used to encrypt the folder. Client didn't inform me about the encryption that they have done this folder and they are non PC literate too. Didn't have the key exported also. How can I decrypt...

    Kesevan45 pointsBadges:
  • URL Filtering

    I'm a network admin for a K-12 district in New Jersey. I was wondering what some other districts across the US are using for a URL/Content filter solution. We currently have Websense 5.5 running onbox with a Cisco Content Engine and are looking at other alternatives.

    Obnetadmin5 pointsBadges:
  • Shared folder server activity

    What would be the best way to log data for files in a shared directory (and sub-directories) on a server? The type of information needed would be something like this: File accessed By whom the file was accessed Date/Time opened Date/Time closed (if possible) Date/Time file saved Everything is a...

    Memonboys45 pointsBadges:
  • System Requirements for Forefront Threat Management 2010

    What are the systems requirements around Forefront Threat Management 2010? This question is from the Microsoft Live Chat which took place on July 13th.

    ITKE440,540 pointsBadges:
  • Windows Decrypt help needed

    I have formatted my Harddisk without backing up my encryption key. Now, I have problems opening the file which encrypted by me old OS. Can anyone advice me how to overcome this situation?

    Kesevan45 pointsBadges:
  • Wireshark/Ethereal Retransmission

    Can anyone explain the mechanisms for retransmission and fast retransmission in Wireshark/ethereal?

    Tbolitho10 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

Thanks! We'll email you when relevant content is added and updated.