1,400 Topics
![]() | |
After outlook rebooting my password has failed. What have happened and what should i do ih this case...Any advice please! | |
Dear all, using Windows 10, I insert a USB stick in a PC, create a Word document and save it onto the USB stick. Later I edit many times the document at different times and in different days but always working on the USB stick. Eventually is there any possibility … | |
People, I am sure you've heard of social bookmarking sites like del.icio.us. You can now upload your bookmarks on a third party site to host your bookmarks so you can have access to your bookmarks from any part of the world when you are away from your home computer. No … | |
Have anyone tried using Privatoria VPN provider. Is it worth using ? | |
Accidentally downloaded an update for adobe flash. Moments later, Bytefence installed itself onto my laptop, as well as an app called 'weatherbuddy'. My browser was also hijacked by Palikan. Finally, I was able to restore my default browser and I installed Malwarebytes and ESET. Both had found and deleted files … | |
What’s the worst that could happen if someone’s account credentials within your organisation fell into a hacker’s hands? | |
Hi Friends, Upon a recommendation I have installed Advanced System Care 93. It seems to be doing what it claims. I have not yet paid anything to upgrade but wonder if this is just another 'cash cow'? Anyone got any advice on ASC 93 please? | |
I forgot my password on my Toshiba Windows 10 laptop. Now every time I turn it on it has a black screen with a white box that says 'enter password' but I don't know the password.. I need to somehow reset my whole laptop. I've tried EVERYTHING, INCLUDING calling tech … | |
Hey everyone, We currently have 7 computer labs with atleast 20 pc's in each. We have to lock the equipment so that it's not taken and our currently solution is to catch all the cables in a padlock and lock them. While this works and stops people from being able … | |
Hello, I am facing a very tiresome problem. Whenever I click on any link (sometimes not even on link, any where on the window) on any web browser (I am using Chrome more), a new tab opens up with address "wonderlandads.com". This stays for fractions of a second and some … | |
According to Microsoft, 75% of organizations with more than 500 employees, have extended AD into either Azure AD and/or Office365. Have you / or are you planning to extend Active Directory into either Azure AD or Office 365 or for any other purposes? | |
Many organisations have systems, applications or services that don’t currently make use of Active Directory but use other sources of information for access control such as mainframes, SaaS, specialized applications, infrastructures or databases. Have you, or are you planning to, extend Active Directory to other systems, applications or services such … | |
Looking for 'top tips' or pieces of advice you would give to someone newly responsible for an organization’s access management security? | |
As alternatives to technology, organisations can write custom scripts or programs to work around shortcomings of native tools, or to automate and assist Active Directory 4 management. Do you use custom scripts or programs to work around shortcomings of native Active Directory? Do you see any risks associated with this? | |
We all know that identity and access management (IAM) tools from third parties can help secure access with Active Directory. However, problems in Active Directory IAM tools can have an impact on the operation or security of the overall AD environment. Identity governance and administration (IGA) tools are often used … | |
Hi there, I’m doing some research around cybersecurity — specifically access management. Does anyone have a moment to answer the below please? 1. Since Windows Active Directory is nearly ubiquitous in enterprises, what are IT professionals doing to secure access? What are the biggest challenges to securing user access using … | |
I was just roaming the internet for some interesting reads and I came across [this very interesting paper](http://www.priv.gc.ca/information/research-recherche/2011/forcese_201107_e.asp) about how to define a legal framework for the "reasonable expectation of privacy" when it comes to our new cyber-existence. I thought I'd share it with you guys, and see what you … | |
I am trying out a function from a book for the first time. I could use some help. It goes: [CODE] function sanitizeString($var) { $var = stripslashes($var); $var = htmlentities($var); $var = strip_tags($var)' return $var; } [/CODE] I have two simple forms. One that asks for an email address and … | |
Any one have idea for best way to advertising? share your idea here | |
Trigger Warning: Old specs are old. This has been a persisent problem for more than a year. Bold items are original parts when issue first noticed. Unbold have been added afterward with no change. CPU: **AMD FX-6300 Six-Core AM3+** FAN: After-market MB: **MSI 970A-G46** RAM: **2x Samsung PC3-8500F**, 2x Hyundai … | |
I want to know the keywords/password of wifi | |
May i know how Secure Socket Layers (SSL) differs from Transport Layer Security (TLS)? And what is the most preferred choice when it comes to SEO? | |
I want to learn basics of ethical hacking. waht should i learn? | |
Hello, I am running MS Windows 10 and usually use Chrome as my browser on my HP Envy Laptop. Currently there is an icon that is planted in the upper right of my screen that is always on top. It appears as an alien looking green cyclops wearing a tuxedo. … | |
I'm trying to develop an app that realises the communication between a gameserver and an applcation. My code so far is: #include <cstdlib> #include <iostream> #include <boost/bind.hpp> #include <boost/asio.hpp> #include <boost/asio/ssl.hpp> using namespace std; enum { max_length = 1024 }; class client { public: boost::asio::streambuf receive_buffer; client(boost::asio::io_service& io_service, boost::asio::ssl::context& context, … | |
Be careful gamers http://arstechnica.com/security/2016/07/fake-pokemon-go-app-on-google-play-infects-phones-with-screenlocker/ | |
Hi, I am trying to disable a forwarder in a mailbox under exchange server 2010 on server 2008 R2 x64 on Hyper-V. When I try to remove the forwarded email in the mailbox and click on apply or OK, I receive error which says, "you must provide a value to … | |
The Membership table for our ASP.NET site has the encrypted passwords and password salts stored when a user logs in. The site is already served over an HTTPS connection, but we would like to give our clients the ability to download and save certain files and documents. We would like … | |
I am a member of another forum and forgot my password, so I clicked the "Forgot password" link and was told "fill this form out and we'll send you your lost password" or words to that effect. It occurred to me that I had never seen language like this and … | |
Nice to meet you all. I'am security expert and i want to learn and share my knowledge with forum members. | |
We want to develop a new SMS gateway service from scratch for our new Product and we are looking for the same product like Twillio and any other SMS service that allow user to send international SMS. We have no idea how to do that and what technology and expertise … | |
Hi everyone, I really hope that you can help me diagnose an issue with my new API. I'm having the following issue: I'm not happy with the performance of the app client at http://app.dazah.com that connects to it ... It uses cURL to issue about 3-4 API requests per page … | |
Hi! I have a problem with Reimage Virus being very active on Google Chrome. I have tried to find it to get rid of it, but do not know enough to be able to locate it. I even did a restore point to try to see if that would fix … | |
Earlier last year, I bought the Acer Aspire E-16 START with a windows 8 operating system, I was using the lastest Kapersky 2015 which worked perfectly with the OS, Ever since I upgraded to windows 10 OS via the internet , Old files of Kapersky application were not executable, Luckily, … | |
will really love to know more about hosting a network and creating a security to it. | |
Like if there are 50 people using computer to surf Facebook at the library don't the accounts gets suspended? My friend tried making 2 facebooks with his home internet the account got locked and said needed to be verified first. But at the library don't they get suspded? Since there … | |
I was stumbling trough the inter net the other day when I came across a company offering Free (3 systems or less) software to help find your Laptop, Tablet, phone, etc. should it be misplaced or stolen. Not a unique idea I know but they had some interesting features besides … | |
I have a question regarding user membership of groups in Active directory and grabbing such memberships with PHP. My big question/situation is that I have a site I am making and essentially I am trying to assign administrators based off of groups in Active directory and I know how to … | |
Good morning, I just want to get an advice from you guys regarding with permission problem. Recently when doing some cut, copy and paste action in my windows 7 pc, I encounter a problem which I cannot open a file. For some instance I cut a file from a folder … | |
Hey, now I if I need to make a Security program for games by #c there are onther thing I should learn it behind #c? | |
HI guys, What is the best textbook for CCNA security preparation? | |
Database systems and Administration Scenario: PEC offers several programs. Each program is supervised / chaired by a Head of the department (HoD) who is a lecturer. One HoD can lead only one program. There are several departments for each program. Many modules are offered by each department. Few departments are … | |
I will soon start my project, but before that I need to set up my server my project is shopping website so I will need web server and database server for the custoerms information. I have couple of question: 1- Can I setup my server in the same computer that … | |
Hi, I am trying to set up a 2012 Server for VPN access, this is not a domain, just a plain 2012 to store files for local access but now I would like to install VPN so we could access the files from remote sites. I have read and followed … | |
What are the requirements to take the CCNA test? I've purchased the book and I'll be spending a large majority of my time studying independently. I'm wondering though, is taking a CCNA course a prerequisite to taking the test or is it just recommended? Thanks! | |
After reading all the hype about the random ware virus I installed BufferZone Pro 64 bit. Worked o.K the first day but after booting today all my visual styles in windows 7 home premium disappeared ( aero glass etc) to make the opened windows really look poor. After uninstalling, everything … | |
Up until recently whenever someone on the network went to a site that required an SSL certificate it would say that there is a securuty risk confirm exception blah blah blah, I managed to fix that but only after confirming the first time. Lets use gmail.com as an example, every … | |
Hello everybody i would like some worked on the field of **SQL test cases generation based mutation**. In fact i almost wrote the test cases mutation code and i generated mutated test cases. but now i want to validate thus inputs or test the mutation by verifiying the killed and … | |
Hi, everyone, I am an IT student, currently in 3rd year. I want to know can I select "Design of netwrok for a campus, (infrastructure CISCO)+ System Administration (microsoft)" what do you think about this. I am interested in in networking, have studed DCCN, currently studying CCNA. |
The End.