Security
Can you help me connect to splunk? I tried to configure splunk and connect to the splunkbase using the proxy from my environment. However, when I try to connect to the splunkbase it did not work.
Could anyone help me?
I'm confused.
- 1184 views
- 1 answers
- 0 votes
Does anyone have ideas on how to reset Active Directory passwords using a web-based utility? I am looking for something similar to Specops and Namescape that will walk the user through the password reset process. This should also be accessible 24 hours a day.
- 773 views
- 1 answers
- 0 votes
Please elaborate on the security issues that can be caused in a multitasking or time-sharing environment when more than one user is using the system at the same time?
- 1028 views
- 1 answers
- 0 votes
I would like to know the reason behind using a Salt Value with the user password. In addition, please clarify how it is used in the encrypted value and where it is stored?
- 1028 views
- 1 answers
- 0 votes
I’m new at work and I just can’t help but notice the laxity of the security settings of the files in my new work. I have resolved most of the issues except this one. I’m thinking that maybe some folks out there can be of help. In my new work, any user can access any files on the file share servers.
Even a newbie in the company can access information by opening the personal drive of the CEO, which contains personal and top secret files. I was successful in locking down his folder, but I have hit a stumbling block with the other 422 folders which needs to be secured also.
- 773 views
- 1 answers
- 0 votes
I want to know about on line banking. Is it always safe? Please help
- 916 views
- 3 answers
- 0 votes
I would like to know which level of RAID uses the same harming encoding method in checking the correctness of disk data error correcting memory (ECC)? If I am going to choose level 2 does it serves the purpose? If yes, why and if not, please give me some ideas on how to choose it? Thank you so much.
- 1073 views
- 1 answers
- 0 votes
What is the importance of Need to Know Principle in the protection of the system? Is there a need that all network users should adhere to this principle? Why? What are some consequences if ever users will not adopt or adhere to this principle? Please explain it in details, thank you.
- 1876 views
- 1 answers
- 1 votes
Anyone can give me the comparison between symmetric and asymmetric encryption and decryption technique scheme. Please discuss also if this can cause the beast in the data security, when this will be distributed to the system and to the web server. Please discuss it thoroughly for I need to be clarified. Thank you.
- 1330 views
- 2 answers
- 0 votes
Anyone know about the Best Norton Antivirus?
please send me Link of Norton Antivirus?
- 896 views
- 1 answers
- 0 votes