1,118 Topics
|
|
Looking for 'top tips' or pieces of advice you would give to someone newly responsible for an organization’s access management security? |
|
As alternatives to technology, organisations can write custom scripts or programs to work around shortcomings of native tools, or to automate and assist Active Directory 4 management. Do you use custom scripts or programs to work around shortcomings of native Active Directory? Do you see any risks associated with this? |
|
We all know that identity and access management (IAM) tools from third parties can help secure access with Active Directory. However, problems in Active Directory IAM tools can have an impact on the operation or security of the overall AD environment. Identity governance and administration (IGA) tools are often used … |
|
Hi there, I’m doing some research around cybersecurity — specifically access management. Does anyone have a moment to answer the below please? 1. Since Windows Active Directory is nearly ubiquitous in enterprises, what are IT professionals doing to secure access? What are the biggest challenges to securing user access using … |
|
I am trying out a function from a book for the first time. I could use some help. It goes: [CODE] function sanitizeString($var) { $var = stripslashes($var); $var = htmlentities($var); $var = strip_tags($var)' return $var; } [/CODE] I have two simple forms. One that asks for an email address and … |
|
Trigger Warning: Old specs are old. This has been a persisent problem for more than a year. Bold items are original parts when issue first noticed. Unbold have been added afterward with no change. CPU: **AMD FX-6300 Six-Core AM3+** FAN: After-market MB: **MSI 970A-G46** RAM: **2x Samsung PC3-8500F**, 2x Hyundai … |
|
I want to know the keywords/password of wifi |
|
I want to learn basics of ethical hacking. waht should i learn? |
|
Hello, I am running MS Windows 10 and usually use Chrome as my browser on my HP Envy Laptop. Currently there is an icon that is planted in the upper right of my screen that is always on top. It appears as an alien looking green cyclops wearing a tuxedo. … |
|
Be careful gamers http://arstechnica.com/security/2016/07/fake-pokemon-go-app-on-google-play-infects-phones-with-screenlocker/ |
|
Hi, I am trying to disable a forwarder in a mailbox under exchange server 2010 on server 2008 R2 x64 on Hyper-V. When I try to remove the forwarded email in the mailbox and click on apply or OK, I receive error which says, "you must provide a value to … |
|
The Membership table for our ASP.NET site has the encrypted passwords and password salts stored when a user logs in. The site is already served over an HTTPS connection, but we would like to give our clients the ability to download and save certain files and documents. We would like … |
|
I am a member of another forum and forgot my password, so I clicked the "Forgot password" link and was told "fill this form out and we'll send you your lost password" or words to that effect. It occurred to me that I had never seen language like this and … |
|
Nice to meet you all. I'am security expert and i want to learn and share my knowledge with forum members. |
|
We want to develop a new SMS gateway service from scratch for our new Product and we are looking for the same product like Twillio and any other SMS service that allow user to send international SMS. We have no idea how to do that and what technology and expertise … |
|
Hi! I have a problem with Reimage Virus being very active on Google Chrome. I have tried to find it to get rid of it, but do not know enough to be able to locate it. I even did a restore point to try to see if that would fix … |
|
Earlier last year, I bought the Acer Aspire E-16 START with a windows 8 operating system, I was using the lastest Kapersky 2015 which worked perfectly with the OS, Ever since I upgraded to windows 10 OS via the internet , Old files of Kapersky application were not executable, Luckily, … |
|
will really love to know more about hosting a network and creating a security to it. |
|
Like if there are 50 people using computer to surf Facebook at the library don't the accounts gets suspended? My friend tried making 2 facebooks with his home internet the account got locked and said needed to be verified first. But at the library don't they get suspded? Since there … |
|
I was stumbling trough the inter net the other day when I came across a company offering Free (3 systems or less) software to help find your Laptop, Tablet, phone, etc. should it be misplaced or stolen. Not a unique idea I know but they had some interesting features besides … |
|
I have a question regarding user membership of groups in Active directory and grabbing such memberships with PHP. My big question/situation is that I have a site I am making and essentially I am trying to assign administrators based off of groups in Active directory and I know how to … |
|
Good morning, I just want to get an advice from you guys regarding with permission problem. Recently when doing some cut, copy and paste action in my windows 7 pc, I encounter a problem which I cannot open a file. For some instance I cut a file from a folder … |
|
Hey, now I if I need to make a Security program for games by #c there are onther thing I should learn it behind #c? |
|
HI guys, What is the best textbook for CCNA security preparation? |
|
Database systems and Administration Scenario: PEC offers several programs. Each program is supervised / chaired by a Head of the department (HoD) who is a lecturer. One HoD can lead only one program. There are several departments for each program. Many modules are offered by each department. Few departments are … |
|
I will soon start my project, but before that I need to set up my server my project is shopping website so I will need web server and database server for the custoerms information. I have couple of question: 1- Can I setup my server in the same computer that … |
|
Hi, I am trying to set up a 2012 Server for VPN access, this is not a domain, just a plain 2012 to store files for local access but now I would like to install VPN so we could access the files from remote sites. I have read and followed … |
|
After reading all the hype about the random ware virus I installed BufferZone Pro 64 bit. Worked o.K the first day but after booting today all my visual styles in windows 7 home premium disappeared ( aero glass etc) to make the opened windows really look poor. After uninstalling, everything … |
|
Hello everybody i would like some worked on the field of **SQL test cases generation based mutation**. In fact i almost wrote the test cases mutation code and i generated mutated test cases. but now i want to validate thus inputs or test the mutation by verifiying the killed and … |
|
Hi, everyone, I am an IT student, currently in 3rd year. I want to know can I select "Design of netwrok for a campus, (infrastructure CISCO)+ System Administration (microsoft)" what do you think about this. I am interested in in networking, have studed DCCN, currently studying CCNA. |
The End.