Security Tag Directory

Featured Security Questions

  • How to encrypt an .exe file into a .Jpeg file?

    Hello guys. I have a question. I want to know how can we encrypt a .exe file into a .JPEG file? Its like, when we open the image file, the .exe file should run on its own. I know there are some complicated encryption methods but are there any simple methods? Can we do that? Are there any threats to...

    Kalyan20088745 pointsBadges:
  • Why do organizations fingerprint?

    When I came to the USA, someone made me do a fingerprint (which I have no knowledge of). Today, anywhere I go to find work, the fingerprint will come up. So I don't know what to do.

    Annankunde15 pointsBadges:
  • Is IP Address filtering really secure?

    We're planning to deploy an internal application with a ton of sensitive data and we're becoming very worried security wise. I suggested to keep it on our internal network but I was vetoed. Inside of the app, we programmed it to only respect requests if they come from an internal IP address...

    ITKE345,950 pointsBadges:
  • Is Forefront client security server compatible with Server 2008 R2?

    Is Forefront client security server compatible with Server 2008R2? This question is from the Microsoft Live Chat which took place on July 13th.

    ITKE345,950 pointsBadges:
  • Protecting PDF Files

    I got some documents printed the other day at a local print shop. I noticed that they moved my PDF from my flash drive to their desktop. Is there a way to protect my files without using a password? Is there a way to make a file open once and after that encrypt it?

    ITKE345,950 pointsBadges:
  • Egress Filtering

    What are the pros and the cons of egress filtering when referring to the network of a medium-sized software business? From what I understand the use of egress filtering will cause issues for some users as it requires policy changes for all new software. But does that annoyance outweigh the...

    ITKE345,950 pointsBadges:
  • Under-the-radar enterprise security threats

    Which enterprise security threat do you think has gone under the radar? As an editor on SearchSecurity.com, I'm interested to hear what you think. Our favorite response will win some great, free security training books. http://searchsecurity.techtarget.com/generic/0,295582,sid14_gci1368789,00.html

    WHurley5 pointsBadges:
  • Etherchannel with different port shapers

    I want to implement a new solution in my network. I want to make an Etherchannel over a STM1 radio link. I don't have Gi ports available so I want to use two aggregated FaEth ports. But I'm thinking of using different service policy on each interface. So, I want to put a service policy with a port...

    bogdanmucuta15 pointsBadges:
  • Monitor Internet bandwidth

    Good day, We are using Windows 2000 Small Business Server in our organization with Exchange, DNS and ISA server configured. 1. I want to monitor the internet usage by the users. 2. I want to take a report on monthly or daily basis how much MB/GB utilized by each user. Thanks for your reply in...

    GiriPrasad0 pointsBadges:
  • EtherChannel protocol

    What protocol does EtherChannel uses to communicate between switches, routers and servers?

    Modu5 pointsBadges:
  • EtherChannel: Port to select frame

    If I have 5 link between 2 Switch and I use EtherChannel, which port is select to send the frame? Or we have & or 6 link?

    a3moonii35 pointsBadges:
  • Is Blackberry 10 the best choice for enterprise in terms of BYOD?

    Jeff Holleran, Blackberry's senior director of enterprise product management, claims that the new Blackberry 10 operating system in conjunction with the BlackBerry Enterprise Service 10 provides the best mobile and BYOD system for both owners and companies.  Do you think he’s right and do you...

    Chris Leonard4,300 pointsBadges:
  • Share network file

    Hi friends...May I know how to make a file read only for everyone expect admin can control it. Thank you.

    wltan70200375 pointsBadges:
  • encryting output file from BCP

    I am exporting data using BCP util, in SQL native format, creating an output format. The proces executes a stored procedure, creating a temporary table, and then the BCP exports the table to an output file, in native SQL. Is there a method to have this output file encrypted without a 3rd party...

    jswayne19645 pointsBadges:
  • AS400 complete File encryption with the Criptographic Card

    I am looking for help with encrypting a complete as400 file with my Criptographic card that is installed. I have a process to encrypt a file record by record but i want to encrypt a complete file with out sending multiple encryption requests to my encryption card. There has to be an API or...

    crewebpub10 pointsBadges:
  • Developing an antivirus (efficient):for Windows:Using VC++

    I am working on a Project for making an antivirus.I have 2 other project parteners. But we don't have an guidance on how to develop the antivirus.Plz give me any relevent Information on this subject.(like components of AV,Algorithms(efficient),methods,general detection & removal of virus).(Also...

    4238830 pointsBadges:
  • Developing an antivirus (efficient):for Windows:Using VC++-2

    I am working on a Project for making an antivirus.I have 2 other project parteners. But we don't have an guidance on how to develop the antivirus.Plz give me any relevent Information on this subject.(like components of AV,Algorithms(efficient),methods,general dection & removal of virus).(Also...

    4238830 pointsBadges:
  • Internet Explorer vs. Firefox

    Hello, I'm the Assistant Editor on SearchWindowsSecurity.com. I'm looking to start a discussion about what browser people are using and why. Also, is anyone considering switching from IE to Firefox, or are your plans to stay with IE? Here's some food for thought... As of Feb. 2005, an estimated 35...

    LMullen0 pointsBadges:
  • File permissions on NAS shared folders

    Good day to all! I would like some information on best practices for a NAS file server specifically regarding file permissions. Currently, anyone who has access to a folder at my company can delete any item in that folder, regardless of who created the item. I personally feel this is incorrect but...

    Jbcaudle0 pointsBadges:
  • Limiting access to VPN users

    Hi, I am using VPN concentrator 3500. Please let me know how to limit access to certain users that have a VPN account on the VPN Concentrator on certain server when they VPN in. Looking forward to hearing from you, With thanks and regards, Helal

    Helalahad0 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following