Security Tag Directory

Featured Security Questions

  • How do you know if your computer has been hacked into?

    I have a few error messages coming up on my laptop screen saying someone is trying to hack into your computer. I thought it was just a virus. Does anyone know if it was a virus or was someone really trying to hack in?

    Verynew20 pointsBadges:
  • Cyber Attack Analysis

    Why has cyber attacks increased since 2008?

    kreali5 pointsBadges:
  • What do you think of the NSA programs that monitor Internet activity and phone records?

    After news broke of the U.S. National Security Agencies (NSA) access to information from a large segment of Internet traffic (social media and domestic companies), discussions about national security and online privacy issues have reached a new high. What do you think of the NSA programs that...

    Michael Tidmarsh27,995 pointsBadges:
  • Information engineering and cybersecurity

    Is computer and information engineering a part of cybersecurity? If yes tell me why and in which subject please?

    meshaa40 pointsBadges:
  • What is the best security framework?

    I am currently a student at UAT and we were directed to this forum with the instructions to post a question about Security Frameworks, so the best question I can have is, What Security Frameworks have any of you personally worked with and which do you feel is better?

    ChadDiehl5 pointsBadges:
  • What should I do to stop people from hacking or tampering my computer?

    I did a chat in a website with a person. Just after few days after, my computer started showing error certificates. (We had Kaspersky internet security set up in it). After that, my CMOS battery failed. I couldn't use Mozilla Firefox and a lots more has changed. Now what should I do to stop this...

    Kittu15Tamilnadu25 pointsBadges:
  • What can CIOs do to counter the spread of cyber attacks?

    With Jeep and Burger King becoming the recent victims of a hacker attack, cybersecurity has become the focus point for many enterprises and CIOs. What should CIOs do to counter the spread of cyber attacks? Can anything be done at all?

    Michael Tidmarsh27,995 pointsBadges:
  • shdocpv.dll – virus – hijack problem

    Hi, I'm sorry if I had chosen the wrong recipient. I am running Windows 2000. When I open my browser (IE 6.0) I get this:res://shdocpv.dll/blank.htmOrres://C:WinntSystem32shdocpv.dllsecurity.htm Please help me to get rid of this. Thanks!

    CUser020 pointsBadges:
  • SAS credit card deliquency project

    Hi, I'm an entrprenure and just want to start some project on SAS. I have got a client and just want to know about that. Can you guys help me with a real time SAS project or can you guide me that where to find that project?

    rkumar715 pointsBadges:
  • Cybersecurity

    What is cybersecurity?

    MONIKABHATHEJA5 pointsBadges:
  • Free IT Book: CompTIA Security+ Certification Passport

    This week's free IT book is Mike Meyers' CompTIA Security+ Certification Passport: Revised for the new CompTIA Security+ exam (SY0-301). The new edition provides a condensed and concise review of CompTIA’s well-established security credential. For a chance to win this quick review, cram-style...

    MelanieYarbrough6,345 pointsBadges:
  • Data vs. perimeter vs. network security

    A short time ago, author Wes Noonan wrote some tips for SearchWindowsSecurity.com about deperimeterization. He explained how security is always pitted against business needs, and perimeters have become porous because businesses require traffic from SMTP, HTTP or VPNs to pass through the firewall....

    RobynLorusso230 pointsBadges:
  • Is there really a security advantage when it comes to spittling a password?

    I've been reading more and more about the LANMAN (LM) hash and I'm having trouble understanding some of the concepts. Is there really any security advantage when it comes to splitting a password, encrypting the two halves separately, and combining the halves to form one hash? Or is it just more of...

    ITKE334,795 pointsBadges:
  • How secure is Identity-Based encryption?

    Over the past several years, I was always taught to never create my own crypto algorithm. But now I'm looking into Voltage SecureMail (which does use identity-based encryption) and I think I'm way over my head in trying to figure out the quality of the system.If you've used Voltage before, I'm...

    ITKE334,795 pointsBadges:
  • Firewall configuration Testing

    I need to do some tests of my firewall configuration. Specifically, I have to run a policy audit independent of any config management systems with an eye to inspecting Cisco PIX/ASA/FWSM and Juniper NetScreen/JunOS devices. Of secondary important (but they have to be done) are reviewing iptables...

    ITKE334,795 pointsBadges:
  • How to find cyphers for HTTPs?

    I'm trying to find some cyphers which are known to be secure for HTTPs. The OpenSSL website has a long list of cyphers that can be used with SSL and TLs, but how to tell which, if any, are still valid and of those which would support HTTPS? Is there a recent paper or similar tool I can use to find...

    ITKE334,795 pointsBadges:
  • GUIDs: Are they actually safe?

    I'm studying to become a security expert and I've noticed a ton of websites use GUIDs for password resets, unsubscribe requests, etc. I'm assuming most sites use them because they're easy to use and they're unique. But I'm curious to find out how safe GUIDs actually are. Are they actually intended...

    ITKE334,795 pointsBadges:
  • Do spaces in paraphrashes add more security?

    When using paraphrases I often see extra spaces added to the sentences. Does this provide more security than a single line of attached character text?

    ITKE334,795 pointsBadges:
  • What is the best way to protect a 4 digit password?

    I've read that hackers can hit all 10,000 possible variations of a 4-digit pin code within 5 minutes. Is this true? If so, what is the best way to secure the password - hashing, salting, bcrypt, or something else?

    ITKE334,795 pointsBadges:
  • Is it time for your company to have cyber liability insurance?

    In a recent survey by the Ponemon Institute, companies now view cyber security risks as outweighing natural disasters and other major business risks. Along those lines, with data breaches becoming such a huge liability, 31% of companies have cyber liability policies in place. Is it time for your...

    Michael Tidmarsh27,995 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following