Security
Why is a Hamachi complaining about tunnel error after upgrading from window 8.0 to window 8.1? I recently upgrade a system and Hamachi fail to connect the client to the network displaying tunnel error. I later uninstall the VPN, behold the next installation produces DLL require. Where do I get the DLL? Could restoring to window 8.0 solve the problem?
- 642 views
- 1 answers
- 0 votes
Recently I have been experiencing the problem of someone accessing my Facebook account again and again. I have the mobile code feature on in which you have to enter code from your mobile so the person is not able to open my account. But I have to keep on changing the password and it is very annoying. What can I do to stop this? Does Facebook have any additional security features?
- 621 views
- 2 answers
- 0 votes
Why is my IP address different from my location? I am having a serious task in changing the system IP to my Location IP. This has started after I install a VPN on my laptop, now my IP is showing Afganistan. I later disable the VPN program, but yet the IP remains the same. After I uninstall the program, the system stop browsing altogether. What is the cause of this behavior? Also, what option do I have to reclaim my IP?
- 577 views
- 1 answers
- 0 votes
Why is my laptop WI if difficult to off after it was switched on? Whenever I switch on the Wi-Fi of my system, to switch off the Wi-Fi is almost impossible. These started after I install new VPN software. The most annoying thing is that I can’t even control who uses my Wi-Fi as anybody within reach can easily connect to my Wi-Fi.
- 549 views
- 1 answers
- 0 votes
How do I attach my digital signature to my email account so that all the mail I send would bear my signature? I have tried all what I know to show my signature at the bottom of the mail I sent, but I haven’t got how to do professionally. The last time I tried, the signature looked like an attachment which is not how I want it to be because other peoples who send their signature with an email to me look unique.
- 610 views
- 1 answers
- 0 votes
Several disaster striking virus like the Shamoon , Flame etc have targeted the energy sector and have caused crippling consequences. What could be a risk management strategy for such critical industries to ensure that there is better defense strategy in place in case of future attacks? Can we eliminate zero day attacks such as the ones above? |
- 584 views
- 1 answers
- 0 votes
How are elliptic curves used in cryptography? What are Elliptic Curve Crypto Systems? How are they different from the RSA? Explain the function used in Elliptic Curve cryptography (ECC). Is this encryption methodologies faster than the conventional models like RSA? Are there any disadvantages of using the Elliptic Curve Cryptography Model in Encryption? |
- 503 views
- 1 answers
- 0 votes
What are the different kinds of Virtual Private Networks (VPN) commonly in use? What is the difference between an intranet VPn and an extranet VPN? With reference to the protocol used, what is the Shiva Password Authentication protocol (SPAP)? Why is not desirable in terms of network Security?Explain EAP authentication method.When is it used? |
- 782 views
- 1 answers
- 0 votes
Twitter and Facebook have fallen victims to Denial of service (DOS) attacks already and so has the White House official website. What can I do to protect my website against a DOS attack? What is a distributed Denial of service (DDoS) attack? How is it different from a DOS attack? What effect can it have on my website? |
- 805 views
- 1 answers
- 0 votes
What is the prospect of using biometrics (say iris scan) for increasing the security of enterprises? How does the cost of setting up such complex software measure up against the cost of administrative tasks incurred when people forget their password? Is it possible to breach this method of identification e.g. can iris scans be duplicated? |
- 489 views
- 1 answers
- 0 votes