1,387 Topics

Member Avatar for
Member Avatar for Sammy_3

Many organisations have systems, applications or services that don’t currently make use of Active Directory but use other sources of information for access control such as mainframes, SaaS, specialized applications, infrastructures or databases. Have you, or are you planning to, extend Active Directory to other systems, applications or services such …

Member Avatar for rproffitt
0
198
Member Avatar for Sammy_3

Looking for 'top tips' or pieces of advice you would give to someone newly responsible for an organization’s access management security?

Member Avatar for rproffitt
0
289
Member Avatar for Sammy_3

As alternatives to technology, organisations can write custom scripts or programs to work around shortcomings of native tools, or to automate and assist Active Directory 4 management. Do you use custom scripts or programs to work around shortcomings of native Active Directory? Do you see any risks associated with this?

Member Avatar for Reverend Jim
0
127
Member Avatar for Sammy_3

We all know that identity and access management (IAM) tools from third parties can help secure access with Active Directory. However, problems in Active Directory IAM tools can have an impact on the operation or security of the overall AD environment. Identity governance and administration (IGA) tools are often used …

Member Avatar for rproffitt
0
297
Member Avatar for Sammy_3

Hi there, I’m doing some research around cybersecurity — specifically access management. Does anyone have a moment to answer the below please? 1. Since Windows Active Directory is nearly ubiquitous in enterprises, what are IT professionals doing to secure access? What are the biggest challenges to securing user access using …

Member Avatar for happygeek
1
356
Member Avatar for mike_2000_17

I was just roaming the internet for some interesting reads and I came across [this very interesting paper](http://www.priv.gc.ca/information/research-recherche/2011/forcese_201107_e.asp) about how to define a legal framework for the "reasonable expectation of privacy" when it comes to our new cyber-existence. I thought I'd share it with you guys, and see what you …

Member Avatar for Reverend Jim
2
2K
Member Avatar for pallen

I am trying out a function from a book for the first time. I could use some help. It goes: [CODE] function sanitizeString($var) { $var = stripslashes($var); $var = htmlentities($var); $var = strip_tags($var)' return $var; } [/CODE] I have two simple forms. One that asks for an email address and …

Member Avatar for owlowl076
0
1K
Member Avatar for neton9
Member Avatar for DeanMSands3

Trigger Warning: Old specs are old. This has been a persisent problem for more than a year. Bold items are original parts when issue first noticed. Unbold have been added afterward with no change. CPU: **AMD FX-6300 Six-Core AM3+** FAN: After-market MB: **MSI 970A-G46** RAM: **2x Samsung PC3-8500F**, 2x Hyundai …

Member Avatar for Reverend Jim
0
687
Member Avatar for Renz_3
Member Avatar for Piers Rollins

May i know how Secure Socket Layers (SSL) differs from Transport Layer Security (TLS)? And what is the most preferred choice when it comes to SEO?

Member Avatar for nancy_9
0
205
Member Avatar for hinaraees
Member Avatar for happygeek
0
433
Member Avatar for Jen_3

Hello, I am running MS Windows 10 and usually use Chrome as my browser on my HP Envy Laptop. Currently there is an icon that is planted in the upper right of my screen that is always on top. It appears as an alien looking green cyclops wearing a tuxedo. …

Member Avatar for Reverend Jim
0
449
Member Avatar for zekstein

I'm trying to develop an app that realises the communication between a gameserver and an applcation. My code so far is: #include <cstdlib> #include <iostream> #include <boost/bind.hpp> #include <boost/asio.hpp> #include <boost/asio/ssl.hpp> using namespace std; enum { max_length = 1024 }; class client { public: boost::asio::streambuf receive_buffer; client(boost::asio::io_service& io_service, boost::asio::ssl::context& context, …

Member Avatar for rubberman
0
1K
Member Avatar for Itsdigger

Be careful gamers http://arstechnica.com/security/2016/07/fake-pokemon-go-app-on-google-play-infects-phones-with-screenlocker/

Member Avatar for happygeek
1
252
Member Avatar for akkbkht

Hi, I am trying to disable a forwarder in a mailbox under exchange server 2010 on server 2008 R2 x64 on Hyper-V. When I try to remove the forwarded email in the mailbox and click on apply or OK, I receive error which says, "you must provide a value to …

0
219
Member Avatar for zachattack05

The Membership table for our ASP.NET site has the encrypted passwords and password salts stored when a user logs in. The site is already served over an HTTPS connection, but we would like to give our clients the ability to download and save certain files and documents. We would like …

Member Avatar for rproffitt
0
529
Member Avatar for AssertNull

I am a member of another forum and forgot my password, so I clicked the "Forgot password" link and was told "fill this form out and we'll send you your lost password" or words to that effect. It occurred to me that I had never seen language like this and …

Member Avatar for AssertNull
0
276
Member Avatar for Securex

Nice to meet you all. I'am security expert and i want to learn and share my knowledge with forum members.

Member Avatar for basi_1
0
117
Member Avatar for anup2009

We want to develop a new SMS gateway service from scratch for our new Product and we are looking for the same product like Twillio and any other SMS service that allow user to send international SMS. We have no idea how to do that and what technology and expertise …

Member Avatar for rproffitt
0
229
Member Avatar for Dani

Hi everyone, I really hope that you can help me diagnose an issue with my new API. I'm having the following issue: I'm not happy with the performance of the app client at http://app.dazah.com that connects to it ... It uses cURL to issue about 3-4 API requests per page …

Member Avatar for rproffitt
0
2K
Member Avatar for Clotilde

Hi! I have a problem with Reimage Virus being very active on Google Chrome. I have tried to find it to get rid of it, but do not know enough to be able to locate it. I even did a restore point to try to see if that would fix …

Member Avatar for Itsdigger
0
316
Member Avatar for owok2002

Earlier last year, I bought the Acer Aspire E-16 START with a windows 8 operating system, I was using the lastest Kapersky 2015 which worked perfectly with the OS, Ever since I upgraded to windows 10 OS via the internet , Old files of Kapersky application were not executable, Luckily, …

Member Avatar for Itsdigger
0
396
Member Avatar for wilkis123

will really love to know more about hosting a network and creating a security to it.

Member Avatar for spicyhost
0
341
Member Avatar for coltdog21

Like if there are 50 people using computer to surf Facebook at the library don't the accounts gets suspended? My friend tried making 2 facebooks with his home internet the account got locked and said needed to be verified first. But at the library don't they get suspded? Since there …

Member Avatar for jacks009
0
333
Member Avatar for rch1231

I was stumbling trough the inter net the other day when I came across a company offering Free (3 systems or less) software to help find your Laptop, Tablet, phone, etc. should it be misplaced or stolen. Not a unique idea I know but they had some interesting features besides …

Member Avatar for CimmerianX
0
346
Member Avatar for toxicandy

I have a question regarding user membership of groups in Active directory and grabbing such memberships with PHP. My big question/situation is that I have a site I am making and essentially I am trying to assign administrators based off of groups in Active directory and I know how to …

0
222
Member Avatar for Emmanuel_6

Good morning, I just want to get an advice from you guys regarding with permission problem. Recently when doing some cut, copy and paste action in my windows 7 pc, I encounter a problem which I cannot open a file. For some instance I cut a file from a folder …

Member Avatar for rubberman
0
315
Member Avatar for Abdelaziz_1

Hey, now I if I need to make a Security program for games by #c there are onther thing I should learn it behind #c?

Member Avatar for JOSheaIV
0
143
Member Avatar for twhentea
Member Avatar for rproffitt
0
225

The End.