On CHOW: Does drinking ice water burn calories?
1 Resources for

security problem

  • Subscribe to this listing via:
  • RSS
  • Email

TechRepublic Resources

The Design of Efficient Internetwork Authentication for Ubiquitous Wireless Communications
The security problem is one of the major challenges in internetworking. To date, most research on internetwork authentication has focused on centralized authentication approaches, where the home network participates in each authentication process. For high latency between the home and visiting networks, such approaches tend to be inefficient. This paper...
Tags: Internetwork, Wireless Communication, Authentication, Wireless, Security Problem, Security
White papers

Additional Resources

Laptop Computer Security
As laptops proliferate, theft has become an ever more critical security issue. Laptop buyers in search of a security solution are faced with a wide array of products, systems, and services, each of which addresses a part of the problem. There remains considerable confusion about the extent of protection provided...
Tags: Laptop Computer, Notebooks, Security, Hardware, Notebooks & Tablets
White papers 2003-03-01
Problem receiving tasks in Outlook
I use Outlook 2003 to assign and keep track of tasks in a small office network. Everything worked fine for quite a while until after a "Windows Update". Now when I send an assignment, the recipient gets the email but is unable to accept the assignment. A...
Tags: Security administration, Patches, Microsoft Office, bennett@..., security update, security, Microsoft Outlook
Discussion threads 2007-03-29
Security Log Error Message
I have a WIN XP Pro system that I am attempting to view the Security Log. I am able to view the Application and System log with a problem however with I click on the Security log I get the following error: Unable to complete the operation on...
Tags: Microsoft Windows XP, hcouncil@..., Security Log
Discussion threads 2007-08-16
The spyware problem and other great security myths
Endpoint security experts FutureSoft address how the driving pressures on business PC security have changed over the last five years and why that change now requires fundamental reappraisals of how businesses regard IT and informational assets, and how they approach security as a whole.
Tags: Spyware, FutureSoft Inc., Security
White papers 2007-03-01
HP ProtectTools Security Manager - v2.0
As computers become more mobile and better connected, threats to data security are increasing in magnitude as well as complexity. Business customers, for whom data security can have a direct impact on the health of their business, are becoming increasingly concerned about this problem. HP saw the need for a...
Tags: Hewlett-Packard Co., Security
White papers 2006-05-01
your current security settings do not allow this file to be downloaded
After recently being infected by a rootkit and re-installing XP Pro I decided to be a little more diligent in respect to my system's security.Today I started using the Security Configuration and Analysis snap-in in the MMC - I found it easily enough and imported a Security Template and applied...
Tags: Web browsers, burnjob@..., security
Discussion threads 2007-10-11
Achieving Email Security Usability
Despite the widespread perception that email security is of critical importance cryptographic email security is very seldom used. Numerous solutions to the problem of securing email have been developed and standardized but these have proved difficult to deploy and use. One of the main reasons for this difficulty is that...
Tags: E-mail Security, E-mail, Cyberthreats, Online Communications, Security
White papers 2006-02-07
Security log is full
hi, i have ran into a serious problem, i changed a few settings on the group policies at work, and now everybody's computer is getting locket out with a message saying "security log is full anly administrators can login"i changed the file siza to 1024 K in the group policie...
Tags: demc_rock@..., Security Log
Discussion threads 2007-10-10
How to Conduct A Security Audit
Information security encompasses more than just IT systems - people who use the systems can also inadvertently open security loopholes. A security audit aims to detect and highlight any problem areas within the IT infrastructure and staff behaviors.
Tags: Information Security, Security Audit, Security
White papers 2000-07-01
THE NETWORK REQUEST IS NOT SUPPORTED
I HAVE INTALLED SAMBA IN LINUX MACHINE AND IN SMB.CONF I HAD MADE SECURITY = USER.IT IS NOT GIVING ANY PROBLEM, BUT WHEN I AM MAKING SECURITY= SHARE IT IS GIVING ME THE PROBLEM.WHEN I AM CONNECTING IT THROUGH WINDOWS IT IS GIVING ME A PROBLEM " THE NETWORK REQUEST...
Tags: cs.abhinav@..., network
Discussion threads 2007-04-05
Towards Security by Construction for Web 2.0 Applications
While security experts routinely bemoan the current state of the art in software security, from the standpoint of the application developer, application security requirements present yet another hurdle to overcome. Given the pressure for extra functionality, "Lesser" concerns such as performance and security often do not get the time they...
Tags: Web, Application Security, Web 2.0, Security, Internet
White papers 2007-04-25
HP ProtectTools Security Manager
As computers are getting increasingly mobile and better connected, threats to data security are increasing in magnitude as well as complexity. Correspondingly business customers, for whom data security can have a direct impact on the health of their business, are becoming increasingly concerned about this problem. HP saw the need...
Tags: Hewlett-Packard Co., Security
White papers 2004-11-01
Creating an Active Directory Site for Exchange Server
Despite the widespread perception that email security is of critical importance cryptographic email security is very seldom used. Numerous solutions to the problem of securing email have been developed and standardized but these have proved difficult to deploy and use. One of the main reasons for this difficulty is that...
Tags: Microsoft Windows Active Directory, Microsoft Exchange Server, E-mail Security, Server, E-mail, Cyberthreats, Online Communications, Security
White papers 2005-10-31
Active X Security
I just purchased FastTrack:HTML and I can't get past the ActiveX security. I have my browser set to "low" security". I'll give you three days until I ask for my money back.CheersPaulWell Paul,This is a community forum where IT Pros attempt to answer problems so the threat...
Tags: ActiveX/COM/COM+/DCOM, ActiveX, Active X Security, security
Q&A; 2006-07-02
Computer Security and the Law
Advances in computer security law have been impeded by the reluctance on the part of lawyers and judges to grapple with the technical side of computer security issues. This problem could be mitigated by involving technical computer security professionals in the development of computer security law and public policy. This...
Tags: Computer Security, Computer, Productivity, Viruses And Worms, Security
White papers
Problem with downloads.....
Everytime I try to download a tutorial, I keep getting a message that says: " Your current security setting do not allow this file to be downloaded".I have rearranged my security setting every conceivable way and I cannot D/L any files.I have Norton Internet Security...could this possibly be interfearing with...
Tags: jaibronx@..., D/L, security
Discussion threads 2007-01-08
Web Services Declarative Security
A major problem facing businesses nowadays is how to quickly and effectively introduce new software technologies into their applications. This can be seen with the introduction of web services, and securing them using web services security. One solution to this problem is to use a declarative environment to rapidly test,...
Tags: Web, Oracle Corp., Web Service, Web Services Security, Web Services, Channel Management, Security, Enterprise Software, Software, Marketing
White papers 2004-11-01
problem
Good day!I want tell you about my problem.Somebady try to blok my Internet Explorer.Now when want to contiunue in the site on my display is write-- problem whith this website's security certificate.So when comme into in your site.Second problem is I can't use my restore sistem.Is bloked...
Tags: tilviu
Discussion threads 2007-09-16
Null Sid Security Group problem in AD
We have 3 Credit Union Branches, the 2 remote branches that run across a T-1 line are having problems on the domain where the Local Group Policy is not applied because of the Null Sid security group after running gpresults. I did some research & removing the computer from the...
Tags: advertisement, uinthas@..., Null Sid
Discussion threads 2007-10-19
  • << Previous
  • page 1 of 1
  • Next >>

Featured White Paper

FlexiCapture 8.0 enables business to run at the speed of data

TechRepublic Featured Jobs

Job Title/Location Posted
  • Powered by: Simply Hired
  • .


Spyware: The Unseen Enemy
TechRepublic's presentation Spyware: The Unseen Enemy is a prepackaged solution for addressing spyware-related problems facing organizations. This pre ...
Buy Now
Windows XP Professional Administration
Microsoft Windows XP's enhanced functionality and business productivity improvements can provide a significant payoff for your organization--but only ...
Buy Now