1,390 Topics
| |
Hey everyone, We currently have 7 computer labs with atleast 20 pc's in each. We have to lock the equipment so that it's not taken and our currently solution is to catch all the cables in a padlock and lock them. While this works and stops people from being able … | |
Hello, I am facing a very tiresome problem. Whenever I click on any link (sometimes not even on link, any where on the window) on any web browser (I am using Chrome more), a new tab opens up with address "wonderlandads.com". This stays for fractions of a second and some … | |
According to Microsoft, 75% of organizations with more than 500 employees, have extended AD into either Azure AD and/or Office365. Have you / or are you planning to extend Active Directory into either Azure AD or Office 365 or for any other purposes? | |
Many organisations have systems, applications or services that don’t currently make use of Active Directory but use other sources of information for access control such as mainframes, SaaS, specialized applications, infrastructures or databases. Have you, or are you planning to, extend Active Directory to other systems, applications or services such … | |
Looking for 'top tips' or pieces of advice you would give to someone newly responsible for an organization’s access management security? | |
As alternatives to technology, organisations can write custom scripts or programs to work around shortcomings of native tools, or to automate and assist Active Directory 4 management. Do you use custom scripts or programs to work around shortcomings of native Active Directory? Do you see any risks associated with this? | |
We all know that identity and access management (IAM) tools from third parties can help secure access with Active Directory. However, problems in Active Directory IAM tools can have an impact on the operation or security of the overall AD environment. Identity governance and administration (IGA) tools are often used … | |
Hi there, I’m doing some research around cybersecurity — specifically access management. Does anyone have a moment to answer the below please? 1. Since Windows Active Directory is nearly ubiquitous in enterprises, what are IT professionals doing to secure access? What are the biggest challenges to securing user access using … | |
I was just roaming the internet for some interesting reads and I came across [this very interesting paper](http://www.priv.gc.ca/information/research-recherche/2011/forcese_201107_e.asp) about how to define a legal framework for the "reasonable expectation of privacy" when it comes to our new cyber-existence. I thought I'd share it with you guys, and see what you … | |
I am trying out a function from a book for the first time. I could use some help. It goes: [CODE] function sanitizeString($var) { $var = stripslashes($var); $var = htmlentities($var); $var = strip_tags($var)' return $var; } [/CODE] I have two simple forms. One that asks for an email address and … | |
Any one have idea for best way to advertising? share your idea here | |
Trigger Warning: Old specs are old. This has been a persisent problem for more than a year. Bold items are original parts when issue first noticed. Unbold have been added afterward with no change. CPU: **AMD FX-6300 Six-Core AM3+** FAN: After-market MB: **MSI 970A-G46** RAM: **2x Samsung PC3-8500F**, 2x Hyundai … | |
I want to know the keywords/password of wifi | |
May i know how Secure Socket Layers (SSL) differs from Transport Layer Security (TLS)? And what is the most preferred choice when it comes to SEO? | |
I want to learn basics of ethical hacking. waht should i learn? | |
Hello, I am running MS Windows 10 and usually use Chrome as my browser on my HP Envy Laptop. Currently there is an icon that is planted in the upper right of my screen that is always on top. It appears as an alien looking green cyclops wearing a tuxedo. … | |
I'm trying to develop an app that realises the communication between a gameserver and an applcation. My code so far is: #include <cstdlib> #include <iostream> #include <boost/bind.hpp> #include <boost/asio.hpp> #include <boost/asio/ssl.hpp> using namespace std; enum { max_length = 1024 }; class client { public: boost::asio::streambuf receive_buffer; client(boost::asio::io_service& io_service, boost::asio::ssl::context& context, … | |
Be careful gamers http://arstechnica.com/security/2016/07/fake-pokemon-go-app-on-google-play-infects-phones-with-screenlocker/ | |
Hi, I am trying to disable a forwarder in a mailbox under exchange server 2010 on server 2008 R2 x64 on Hyper-V. When I try to remove the forwarded email in the mailbox and click on apply or OK, I receive error which says, "you must provide a value to … | |
The Membership table for our ASP.NET site has the encrypted passwords and password salts stored when a user logs in. The site is already served over an HTTPS connection, but we would like to give our clients the ability to download and save certain files and documents. We would like … | |
I am a member of another forum and forgot my password, so I clicked the "Forgot password" link and was told "fill this form out and we'll send you your lost password" or words to that effect. It occurred to me that I had never seen language like this and … | |
Nice to meet you all. I'am security expert and i want to learn and share my knowledge with forum members. | |
We want to develop a new SMS gateway service from scratch for our new Product and we are looking for the same product like Twillio and any other SMS service that allow user to send international SMS. We have no idea how to do that and what technology and expertise … | |
Hi everyone, I really hope that you can help me diagnose an issue with my new API. I'm having the following issue: I'm not happy with the performance of the app client at http://app.dazah.com that connects to it ... It uses cURL to issue about 3-4 API requests per page … | |
Hi! I have a problem with Reimage Virus being very active on Google Chrome. I have tried to find it to get rid of it, but do not know enough to be able to locate it. I even did a restore point to try to see if that would fix … | |
Earlier last year, I bought the Acer Aspire E-16 START with a windows 8 operating system, I was using the lastest Kapersky 2015 which worked perfectly with the OS, Ever since I upgraded to windows 10 OS via the internet , Old files of Kapersky application were not executable, Luckily, … | |
will really love to know more about hosting a network and creating a security to it. | |
Like if there are 50 people using computer to surf Facebook at the library don't the accounts gets suspended? My friend tried making 2 facebooks with his home internet the account got locked and said needed to be verified first. But at the library don't they get suspded? Since there … | |
I was stumbling trough the inter net the other day when I came across a company offering Free (3 systems or less) software to help find your Laptop, Tablet, phone, etc. should it be misplaced or stolen. Not a unique idea I know but they had some interesting features besides … | |
I have a question regarding user membership of groups in Active directory and grabbing such memberships with PHP. My big question/situation is that I have a site I am making and essentially I am trying to assign administrators based off of groups in Active directory and I know how to … |
The End.