Search Results

Search found 12926 results on 518 pages for 'security risks'.

Page 287/518 | < Previous Page | 283 284 285 286 287 288 289 290 291 292 293 294  | Next Page >

  • How much is penetration testing paid ?

    - by stoleto
    Hi. I want to know how much pentesters earn by doing various security audits - I know it's not some universal standard and that mainly it depends on the company, but i would like to know how much is it for some average-sized company, and how much money is for some bank e.x. Please answer me because i need to know, Thank you.

    Read the article

  • How do I get SQL Profiler to show statements with column names like 'password'?

    - by Kev
    I'm profiling a database just now and need to see the UPDATE and INSERT statements being executed on a particular table. However, because the table has a 'Password' column the SQL Profiler is being understandingly cautious and replacing the TextData column with: -- 'password' was found in the text of this event. -- The text has been replaced with this comment for security reasons. How do I prevent it doing this because I need to see the SQL statement being executed?

    Read the article

  • Exchange 2010 Discovery Search Fails

    - by ITGuy24
    When ever I run an Exchange 2010 SP1 Discovery Search I get the following error: "Search failed as the results link to the target mailbox '[email protected]' couldn't be generated." I have checked to ensure the discovery mailbox is enabled I created a new Discovery mailbox. I get the same error with both Mailboxes. The user account I am using to run the search is a member of the "Discovery Management" security group. I get the same error whether I use the Shell or the ECP to run the search

    Read the article

  • Caveats of running software inside the Users directory

    - by kotekzot
    I have some applications that I'd like to stay with my user forever. I've invested a lot of time in customizing them, and doing it from the start would be rather annoying. To that end, I'm thinking about moving them inside my Users folder, as it is the most redundantly-backed up directory on my computer. Are there any concerns associated with running software inside the Users directory, save for updating absolute paths? File permissions and security come to mind.

    Read the article

  • Does the Virtual PC XP Mode need safety measures?

    - by Ivo
    Does the Virtual PC XP-Mode (or any other virtualized mode) require safety measures, such as antivirus or a firewall? I'm just wondering if the XP-Mode would be a large security loophole, since it's so much more integrated into Windows 7. Actually I'm wondering the same for Portable Ubuntu, are their any safety measures I should undertake, so that I don't open a backdoor on my computer.

    Read the article

  • Best way to segment traffic, Vlan or subnet

    - by thebird
    We have a medium sized network of around 200 nodes and are currently in the process of replacing old daisy chained switches with stack-able or chassis style switches. Right now our network is broken up via subnet; production, management, IP, etc each on a separate subnet. Does anyone have an opinion on whether creating Vlan's instead of subnets would be more beneficial? Our general goal is to prevent bottlenecks, separate traffic for security, and to manage traffic with more ease.

    Read the article

  • Cisco NAT vs Bridge vs BVI

    - by cjavapro
    The only devices on this particular LAN will all have public IP addresses. Also the public IP address will be configured directly on the machine,,, so we will not translate private/public IP addresses. If we use NAT,, we would have to translate the public IP on the WAN to the public IP on the LAN. The only security feature I expect on the gateway is an access list. I don't really know much about networking, so I am sorry if this question is generic.

    Read the article

  • How to implement a secure authentication over HTTP?

    - by Zagorax
    I know that we have HTTPS, but I would like to know if there's an algorithm/approach/strategy that grants a reasonable security level without using SSL. I have read many solution on the internet. Most of them are based on adding some time metadata to the hashes, but it needs that both server and client has the time set equal. Moreover, it seems to me that none of this solution could prevent a man in the middle attack.

    Read the article

  • How to provide wireless internet in a small business?

    - by ColinYounger
    My wife has a small business that she wants to offer a free WiFi hotspot in. She suggested opening up our private 'net connection to the customers - T&Cs of our internet provider and thoughts of random people viewing kiddy porn floated through my mind. So, first action will be to get a separate internet connection. But I have no experience of setting up a public WiFi connection. What considerations should I make with regards to: WAP Security Access logging?

    Read the article

  • How to provide wireless internet in a small business?

    - by ColinYounger
    My wife has a small business that she wants to offer a free WiFi hotspot in. She suggested opening up our private 'net connection to the customers - T&Cs of our internet provider and thoughts of random people viewing kiddy porn floated through my mind. So, first action will be to get a separate internet connection. But I have no experience of setting up a public WiFi connection. What considerations should I make with regards to: WAP Security Access logging?

    Read the article

  • Can I limit remote desktop to a particular network card?

    - by Jack Mills
    I have two routers/internet connections connected to my PC. One is a slower connection with a fixed IP that I use for business, the other is a faster connection I use for day to day surfing. I have to use the fixed IP connection to log onto certain servers (due to security) to work but I'm finding that often my PC will try to use my other internet connection to connect which will get rejected (as it doesn't have the fixed IP). Can I limit remote desktop to use a particular network card to get around this problem. Note: I'm running Windows 7

    Read the article

  • Install MacAfee And Node32

    - by hosseinsinohe
    Hi All I Have a Computer With Windows Xp Service Pack 3 as an Operating System.This Computer is In the Network With The MacAfee Update Server.This Server Will be Install And Update MacAfee Client Version In The All Computers in The Network.When I Install And Runing 'Eset Node32 Smart Security or AntiVirus' in My Computer,The Computer will be Hang And Freeze And I Can Not Work with Computer.I Restart The Computer And Try Again And Try With Safe Mode To Fix This Problem(Unistall Node32 For Fix:-) ),But I Can Not Fix This Problem.How Can I Fix This Problem And Install Node32 And MaCAfee On This Computer 's Network?

    Read the article

  • Data Center Design and Preferences

    - by Warner
    When either selecting a data center as a co-location facility or designing a new one from scratch, what would your ideal specification be? Fundamentally, diversified power sources, multiple ISPs, redundant generators, UPS, cooling, and physical security are all desireable. What are the additional key requirements that someone might not consider on the first pass? What are the functional details someone might not consider during the initial high level design?

    Read the article

  • Windows 2003 Domain controller

    - by user40766
    I have a win 2K3 domain controller that has sudddenly started logging about 60 events a second. All events are ID 538, 540 and 576 All events pertain to Security Audit of the machine itself logging in successfully. a typical entry is Event Id 540 Successful Network Logon: User Name: <machinename>$ Any pointers to how I can diagnose this? CPU and memory are normal on the machine.

    Read the article

  • How does Ubuntu keep track of the "System restart required" flag in motd?

    - by Anders Lindahl
    I have a few Ubuntu servers (8.10, 9.10) that is set to automatically install security updates. Some times these updates requires a restart of the system, and this string is shown in motd: *** System restart required *** To get a notice about these, I plan to write a Nagios test to monitor if the server is in need of a reboot. So, my question: Is there a better way than parsing /etc/motd to find out if a reboot is needed?

    Read the article

  • Could not connect to the Virtual Server on “ ”. Access was denied.

    - by Kobojunkie
    HI. I downloaded Virtual Server R2, but when I try to create a Virtual Server from the administrative site, I get the following error message Could not connect to the Virtual Server on “MyServerName”. Access was denied. You can specify an alternate Virtual Server below. I have tried configuring DCOM security but that did not help much. Anyone have a solution please? Thanks in advance

    Read the article

  • Accessing Internal Server from Outside through SSH

    - by myahya
    The issue is as follows: I am using Ubuntu Linux. I am working from home, and I need to access a PostgreSQL database severer within my company's network. Call the DB server X. For security reasons, only one machine can be accessed from the outside using ssh, call it Y. So the scenario is: Home <--SSH-- Y <----- X(DB) I think something like SSH forwarding (configured in .ssh/config) could help with this, but I am not sure how to do this, any ideas?

    Read the article

  • Images not accessible in localhost using wamp in windows 7

    - by Am poru
    I Installed wamp in windows 7 pro, and copied a joomla live site. Everything seems working well except that it doesn't load the images on the page. Even when I try to access in directly: localhost/logo.png Im getting an 403 Forbidden: Forbidden You don't have permission to access /logo.png on this server. Solutions I have tried are: Using icacls to grant priviledge Folder Permissions Issue in Windows 7 manually set the permission by right clicking the image and editing the security.

    Read the article

  • How to combine AWS and dedicated external servers?

    - by rfw21
    I have an extensive network of servers all currently hosted on AWS EC2. For reasons of cost I plan to gradually migrate to dedicated servers where possible. So: How can I best combine AWS and non-AWS servers in my network? Ideally, I should be able to assign internal IP addresses to the external servers, include them in AWS security groups and ensure that all private traffic between my AWS servers and external servers is secure.

    Read the article

  • How to execute home directory shell script file in php

    - by vvr
    How to execute /home/scripts/test.sh file in php Previously i have placed 'test.sh' file in the /usr/bin and calling in my php file like this exec('test.sh ' . escapeshellarg($testString)); But for security reasons i moved .sh file to /home/scripts directory and in my php i am calling like this exec('/home/scripts/test.sh ' . escapeshellarg($testString)); But it is not working now. Please suggest me how to achieve this.

    Read the article

  • Change default root user with a new one on Ubuntu Server

    - by MultiformeIngegno
    I have a VPS, until now I used the default root user for SSH access and everything. For security reasons I'd like to use a different user for root, terminal access and sudo operations. So I created another user, gave him the sudo and every other perm. The problem is that all the system files belongs to root. What happens if I set PermitRootLogin No for root? Those files wouldn't be editable by the new root user!

    Read the article

< Previous Page | 283 284 285 286 287 288 289 290 291 292 293 294  | Next Page >