Search Results | Authentication
PREV 1   2   3   4   5   6   7   8   9   10...   20   30   40   50   60   70...119 NEXT
Sort by:  Most Relevant  |  Date
Biometric Issues in Healthcare using Mobile COWs (Carts on Wheels)

Answer  Hello, We currently usebiometric authentication (Sagem Morphosmart 1300)on our clinical units in a hospital setting. These COWs are powered by a battery power supply located on the cart and there is no battery in the laptop. We have consistently and frequently experienced USB failures on the b...

Last updated: Jan 28, 2010   7:50 PM GMT   |    Authentication, Biometric authentication, Biometrics
Why isn't two way authentication with SSL implemented more often?

Answer  We hear about SSL vulnernabilities, how SSL is "broken." One complaint I don't hear often enough is the lack of attention to Certificate Revocation Lists. For example, Verisign could revoke a certificate and Firefox users would continue to think they were making a trustworthy connection. That's a cl...

Last updated: Sep 7, 2009   9:23 PM GMT   |    Authentication, SSL, SSL Certificates
Problems authenticating into OWA on Exchange Server 2003

Answer  I run Exchange Server 2003 on Windows Server 2003 and all of my users use OWA. However, one user cannot authenticate into OWA. I've checked the user's account properties and cannot find any differences from the other accounts that work without any problem. Also, I cannot log into that user's OWA fro...

Last updated: Nov 23, 2009   9:38 PM GMT   |    Authentication, Exchange 2003, Exchange Server 2003
Deploying IP address authentication in Radius server

Answer  Dear All, Please provide me a solution, where we want to bind IP address with MAC ID of the wireless client and should be authenticated by Radius Server. Is this solution exist? I will be very thankful if you could provide me the solutions. Akash

Last updated: Apr 20, 2010   7:48 AM GMT   |    Authentication, IP address, IP Address Authentication
Authentication for more than one subnet

Answer  I have about 8 vlans on my catalyst switch connecting pple to the internet.I want to configure authentication for all the users on the vlans. vlan 1 192.168.11.1 255.255.255.0 vlan 2 192.168.12.1 255.255.255.0 vlan 3 192.168.13.1 255.255.255.0 ... vlan 8 192.168.18.1 255.255.255.0 What type of authe...

Last updated: Apr 28, 2011   12:34 AM GMT   |    Authentication, Cisco 3560, Subnet
Active directory with Uniface

Answer  How to use Active Directoy with Uniface Has anyone used Active Directory to authenticate users of a Uniface application? If so, how.

Last updated: Jan 26, 2011   3:20 PM GMT   |    Active Directory, Authentication, Uniface
IP Authenticate

Answer  how I can allow in my network under the firewalla single ip where other external net IPs can enter?

Last updated: Dec 31, 2010   6:00 AM GMT   |    Authentication, External IP Addresses, Firewalls
About ASP.NET Authentication removal

Answer  For my web project, already some Authentication are fixed. due to this i cant able to access some folders. What should i do in web config file to exclude that perticular folder from the authentication settings? pls anybody giv solution

Last updated: Mar 28, 2011   7:03 AM GMT   |    ASP.NET, ASP.NET authentication, Authentication
AS400 Single Sign On - Windows Server 2008

Answer  I am attpemting to athenticate using kerberos on Active Directory - Windows Server 2008. The System i configuration planning documentation maps the user account to the principal on Windows 2000 using ktpass. Published documentation for Windows server addresses Windows server 200 and 2003. How is thi...

Last updated: Aug 5, 2010   4:05 PM GMT   |    AS/400, AS/400 Single Sign On, Authentication
Removing a Pre-boot Authentication System

Answer  Alright, so recently I handed a locked computer that was protected by a pre-boot authentication system. The person who locked it is long gone and I dont know the administrative code. I can, however, log onto the computer with my co-workers finger print. I have the computer in safety mode, but ...

Last updated: Jun 22, 2010   6:05 PM GMT   |    Authentication, Fingerprint authentication
Using Active Directory credentials to log onto Windows 2003 FTP Server

Answer  Can we let Active Directory 2003 domain users to use their AD credentials to log into Windows 2003 FTP servers? Can we allow single sign on so they would not technically have to authenticate on each connection?

Last updated: Jun 9, 2011   1:30 PM GMT   |    Active Directory 2003, Active Directory Permissions, Authentication
ADS for campus - Architecture

Answer  We are planning to do some IT services to other companies on our campus. In the near future large and small companies will join on our campus and some need all ind of services and others perhaps only Internet access . . . but all companies need to have access to some data and IT services (campus wid...

Last updated: Dec 27, 2013   9:02 PM GMT   |    ADS, Authentication, Security
Intercepting two-factor authentication (SMS)

Answer  I'm trying to learn more about "IT Security" and I've come across two-factor authentication. I understand two-factor authentication mechanisms use SMS to deliver single-use passphrase to the user. But how secure is it? Is it hard to intercept the SMS message containing the passphrase? Do mobile ne...

Last updated: Nov 21, 2013   6:12 PM GMT   |    Authentication, Encryption, SMS
I'm looking for a stronger authentication method for web services

Answer  I deployed a two-factor-authentication solution in order to strength logon to our web applications. The majority of our users who have new tokens are also pop3/imap users (this is from a long time ago). However, I noticed web applications are well protected by 2FA , but mail applications is an ea...

Last updated: Nov 25, 2013   6:49 PM GMT   |    Authentication, POP3, Web application
Readers' Choice 2010 Best Authentication Products

Discussion  Readers vote on the best digital identity verification products, services, and management systems, including PKI, hardware and software tokens, smart cards.

Last updated: Nov 12, 2013   3:52 PM GMT   |    Authentication, Identity verification, PKI
Readers' Choice 2009 Best Authentication Products

Discussion  Readers vote on the best digital identity verification products, services, and management systems, including PKI, hardware and software tokens, smart cards.

Last updated: Nov 12, 2013   3:53 PM GMT   |    Authentication, Identity verification
Authentication, authorization and accounting

Discussion  This tip defines authentication, authorization and accounting and how they interrelate.

Last updated: Nov 15, 2013   2:41 PM GMT   |    Accounting, Authentication, Authorization
Authentication and access

Discussion  This tip describes levels of authentication and various access methods.

Last updated: Nov 15, 2013   11:17 PM GMT   |    Authentication, Network access
Spammers hijack authentication mechanisms to send malware

Discussion  Content filtering provider AppRiver reports an attack gaining momentum by using trusted systems to push malware before anyone notices.

Last updated: Dec 11, 2013   0:51 AM GMT   |    Authentication, malware, Spamming
Database authentication, encryption getting priority in some businesses

Discussion  While more organizations are seeking database authentication and encryption technologies, others are turning to database monitoring to secure data.

Last updated: Nov 16, 2013   10:29 PM GMT   |    Authentication, Database encryption
Global authentication policies made easy

Discussion  The challenge of implementing global authentication policies can be alleviated. Joel Dubin lays out best practices for overcoming language, culture and architecture problems.

Last updated: Nov 25, 2013   4:11 AM GMT   |    Authentication
Financial security pros expect improved funding in second half of 2009

Discussion  A SearchFinancialSecurity.com survey indicates a security spending rebound in financial services with companies investing in authentication, encryption and network access control.

Last updated: Dec 11, 2013   0:59 AM GMT   |    Authentication, Encryption, Security
Two-factor authentication's time has arrived

Discussion  Companies seem to be clamoring for stronger forms of authentication in the consumer market after years of password-only problems.

Last updated: Dec 11, 2013   3:56 AM GMT   |    Authentication
EMC adds authentication with security acquisition

Discussion  EMC plans to add its acquisition of identity management vendor Verid Inc., to its RSA Adaptive Authentication suite.

Last updated: Nov 16, 2013   11:37 PM GMT   |    Authentication, EMC, Identity management
Download Authentication Best Practices for 2013

Discussion  Industry experts Jonathan Hassel and Ajay Kumar take a deep dive into the murky waters of identity management and authentication to explore whether the newest kid on the block, cloud identity management, is ready for prime time, and also provide a comprehensive introduction and best practices for tw...

Last updated: Nov 19, 2013   5:50 PM GMT   |    Authentication
PREV 1   2   3   4   5   6   7   8   9   10...   20   30   40   50   60   70...119 NEXT

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: