Type Title Body Nid Author Replies Last Post Reads Categorysort icon
Question Lock screen without any password login Hello experts, I recently upgraded from Windows 8 to 8.1. prior to the upgrade, when I pulled out my computer out of sleep mode, it brought up 74375 Lloyd S Lebron 1 2013-11-09 03:08 389 Misc Security
Question My new computer with Windows 8 operating Hi guys, I've been using an XP system for a long time but because of many issues, I can't find any more fix for it. So I bought a new 74434 George J Layton 1 2013-11-09 14:52 263 Misc Security
Question Move libraries base folders to other Hello experts, My problem started after my last Windows Update. Also, there are times that I can't seem to log in or after logging in, my 74473 Wendy C Moorehead 1 2013-11-11 12:36 321 Misc Security
Question Sim Card Invalid Error on Factory Unlocked Hello experts, I bought 2 units of iPhone 4S from Singapore and send it to my brother and his friend in India. Apple seems to have many issues so 75031 Marilou D Studer 1 2013-11-23 23:58 337 Misc Security
Question Snort doesn't trigger by the port scan I have installed Snort Intrusion detection system on Ubuntu virtual machine with snort rules that are freely available on snort website plus 75141 Cruz D Hatchell 1 2013-12-03 20:15 448 Misc Security
Question Best identity blocker for Mac Hi Techyv Friends, I am in need of the best identity blocker for Mac computer that will help me to block unwanted web sites. Also do let me know 75229 Lucien A Nieves 1 2013-11-30 15:27 420 Misc Security
Question What to do if malicious software is detected Microsoft Security Essentials has detected some kind of malicious software on my PC. I received the following three alerts: Remove, Quarantine and 75250 Alan Wuest 1 2013-11-29 14:25 339 Misc Security
Question System doesn't boot in Safe mode My computer is facing Anti Virus Security Pro issues. Whenever I try to boot my system in SAFE mode and enter my login details, it reboots again. 75279 Aldo Dillan 1 2013-11-30 01:40 357 Misc Security
Question How Exchange pop up issue solved? Hello, I am facing a problem on some users where Certificate errors pops up. This happens to users using Microsoft outlook 2010. Any one have 78419 Thomas T Deloach 1 2015-01-29 20:37 454 Misc Security
Question Installing Symantec Endpoint Protection I have 4 Desktops Computers running on Windows XP Pro 32-bit. I am having a trouble with the Symantec Endpoint Protection when I install version 12 80101 Dale G Jackson 1 2014-08-22 23:43 506 Misc Security
Question Folder containing some important .exe file Folder containing some .exe files of some c-programs gets infected from some type of virus. I need to execute some .exe files for my project and 80616 Beatricegvavra 1 2015-01-10 21:56 350 Misc Security
Question How would you would you differentiate Symmetric encryption is faster but difficult to implement. Explain why? What is it also known as ?How does it work ?What is asymmetric encryption? 81134 James J Khan 1 2015-03-27 16:01 247 Misc Security
Question SSL is very important for websites into What is a Secure Socket Layer (SSL)?  How does SSL work? If you are a trader, why is it important that you have SSL on your website? How can 81168 Abrahamahartman 2 2015-01-22 03:27 310 Misc Security
Question Guard your website from a XSS attack. What is Cross Site Scripting? When do these occur? How is a cross site scripting attack executed? What are the categories of Cross Site Scripting 81171 Avah.hannah 1 2015-02-17 12:40 330 Misc Security
Question How does a hashed and salted password Hashed and salted passwords are used in cryptography to reduce password vulnerability to hash attacks. What is the process of hashing? What is the 81179 Avery Brandonn 1 2015-01-21 09:03 251 Misc Security
Question How to Authenticate Financial Transactions I have a website and we are going to implement some payment gateways for people who purchase items from my website. I do not know much about web 81268 Tim C Bonner 2 2015-01-16 13:07 277 Misc Security
Question Implementing Intrusion Detection Systems ( I want to beef up security on my server network. I need to install an intrusion detection system which will prevent hackers from taking over the 81357 Machelle P McKeon 1 2014-11-25 09:42 249 Misc Security
Question The difference between Information What is information protection? Name some methods used to implement the same in an organization. What should an information protection policy 81365 Beatricegvavra 2 2014-12-30 01:53 280 Misc Security
Question A DOS attack could leave your system out of What is a three way handshake? What are the three components of a 3 way handshake? What is a denial of service attack? How can the 3 way handshake 81366 Corey Joel 1 2014-11-19 14:37 246 Misc Security
Question How to protect my PC from malware? What is browser hijacking software? What would it do to my system? Where would I most likely find it? How can I identify one when I see it? 81749 Coury timmons 2 2015-11-02 08:36 551 Misc Security
Question The science of public key cryptography and What is public key cryptography? Is it the same as asymmetric cryptography? Public key cryptography uses public key and a private key for 81757 Ave broers 1 2014-12-01 14:20 270 Misc Security
Question Proprietary Vs Open Source Project, which is What is an Open source web application project in Security? Is it more or less secure than a proprietary one? What could be the downside of 81766 Barbara Rothermal 2 2014-12-30 02:07 321 Misc Security
Question Why do we need to know about encoding? What is encoding? How is it different from Encryption? What are the types of encoding which are commonly used? What is Tactile encoding? On 81773 Coshaun James 1 2014-12-03 20:03 302 Misc Security
Question I need to source for valid information about I am in the information security business and I would like to know the sources which I can refer to to be on the top of things on matters 81782 Margarete S Bryson 2 2015-01-16 22:45 271 Misc Security
Question Linux or Windows: which is a more secure Is it true that Linux is better placed than Windows with respect to security. Windows being a proprietary software is more secure as hackers 81783 James J Khan 1 2014-12-05 13:45 261 Misc Security