Search Results

Search found 22139 results on 886 pages for 'security testing'.

Page 441/886 | < Previous Page | 437 438 439 440 441 442 443 444 445 446 447 448  | Next Page >

  • How do I limit concurrent sftp / port forwarding logins

    - by Kyoku
    I have ssh set up so my users can only access sftp and port forwarding, how can I limit the number of concurrent logins on a per user basis? In my sshd_config I have UsePAM set to yes and in /etc/security/limits.conf I have: username - maxlogins 1 I also tried: username hard maxlogins 1 Neither of these works and the users can still log in multiple times.

    Read the article

  • How to reinstate toolbars on an embedded PDF with Firefox and Adobe Reader plugin?

    - by Grundlefleck
    Using Firefox I was viewing a PDF file embedded within a web page, with the toolbar available. After right-clicking to deselect the toolbar (I was testing something) I cannot find a way to reinstate them. Since the toolbar is enabled by right clicking on the toolbar area, when it's disabled, it's not obvious how to reenable it. When the toolbars have been disabled and no longer visible, how do you reinstate them? Version info: Firefox 3.6.3 Adobe Reader 9.3 Kubuntu 10.04

    Read the article

  • Windows powering off after "preparing your desktop" stage.

    - by Jack
    Windows 7 64 bit. The only recent change was I installed two updates for MS Office, and a cumulative security update for IE. As soon as I choose a user and login, after loading my user profile it states the preparing your desktop message, and then powers off. I have used DaRT to check the event log, but nothing is recorded. Ideas?

    Read the article

  • Capture VNC server packets and transfer to and fro to routing server using C#.net

    - by Renuka
    We are using Tight VNC server in our project for screen sharing, due to some security constraints we cannot directly install Tight VNC server on clients machine. So through .net windows applicaton we are invoking Tight VNC. Now this windows application should capture the screens(packets) that VNC server passes to VNC client and transfer them to and fro to routing server, routing server will inturn transfers these packets to VNC client, which is on another network. Is there any way that VNC server packets are caputured through .Net.

    Read the article

  • Simulating proxy in VMware

    - by BloodPhilia
    I'm currently testing out a new proxy system that I'd like to try out on my own computer. Because I do not have an additional PC available, I though I'd do it with VMware. Here's what I'd like to do: The physical computer is to make an internet connection using the VMware proxy and not the router. Is this (1) possible and (2) if so, how am I to accomplish this? Thanks!

    Read the article

  • Improved ACL editor for Windows file permissions

    - by Myrddin Emrys
    I have recently been doing a lot of updates to our network drive permissions... such as consolidating direct user permissions into group permissions. The built-in ACL editor (Advanced Security Settings dialog) is adequate, but its limitations are frustrating, particularly that it cannot be resized and you cannot look at the list of existing entries at the same time as you are adding a new entry. Is there an improved ACL editor that can be downloaded to supplement the default one?

    Read the article

  • backup aws ec2 to separate account

    - by Paul de Goede
    I want to backup my AWS snapshots to a completely separate AWS account for additional security (if my AWS credentials were acquired someone could delete all my snapshots and volumes). But I'm a bit stumped on how to do this. There doesn't seem to be a way to store a volume or snapshot in S3 such that another user could access that data in s3 and store it in a separate AWS account. Does anyone have any suggestions on how to acheive this? Thanks

    Read the article

  • How is the filesystem of Wikipedia designed?

    - by Heo
    I read about FHS, and I started to consider the file system of wikipedia. On the one hand, I feel it is a security risk to let everyone know it. On the other hand, it is necessary for developers. For example, is there some rule to know where are all sitemaps and their indices located? So: How is the file system of Wikipedia designed?

    Read the article

  • How do I prevent apache from serving the .git directory?

    - by Shoan
    I have started using git for deployment of websites for testing. How do I prevent apache from serving the .git directory contents? I tried <Directorymatch "^/.*/\.svn/"> Order deny,allow Deny from all </Directorymatch> with no success. I know that I can create a .htaccess file in each .git directory and deny access, but I wanted something I could put into the main config file that makes this global across all websites.

    Read the article

  • How do I get SQL Profiler to show statements with column names like 'password'?

    - by Kev
    I'm profiling a database just now and need to see the UPDATE and INSERT statements being executed on a particular table. However, because the table has a 'Password' column the SQL Profiler is being understandingly cautious and replacing the TextData column with: -- 'password' was found in the text of this event. -- The text has been replaced with this comment for security reasons. How do I prevent it doing this because I need to see the SQL statement being executed?

    Read the article

  • How can I migrate lab manager VM to vCloud Director

    - by jfmessier
    A friend of mine has been asked to start experimenting with migrating VMs from Vmware Lab Manager to vCloud. We know the machines/labs have to be undeployed and consolidated, which is done for this testing lab. However, what should be the next steps to make this as efficient as possible, as we have a large number of labs to migrate. Also, the dependencies tree is huge and the consolidation process is a big thing, but we know we cannot avoid this. Thanks :-)

    Read the article

  • Linux tools to choose suitable Cisco ASA 5500

    - by linuxcore
    I have a linux webhosting server which affects a high DDOS. I want to use Cisco ASA 5500 Series Adaptive Security Appliances to protect the linux server from this DDOS. I know there are many factors should you know before you choose the suitable hardware firewall like the amount of this DDOS and pps ..etc Please suggest a linux tools to measure those factors and to help me collect the required informations ( pps - amount of DDOS - concurrent connections and other factors ) Regards,

    Read the article

  • linux text editor for windows

    - by lego 69
    hello, can somebody recommend me good Linux text editor for Windows (if it exists), I wrote scripts for C-Shell using txt editor of windows but I have problem, it doesn't run cause windows is not UNIX, what can I do? I don't want to install linux for a few scripts, I do testing of my scripts via unix server (this server is not mine), thanks in advance

    Read the article

  • Images not accessible in localhost using wamp in windows 7

    - by Am poru
    I Installed wamp in windows 7 pro, and copied a joomla live site. Everything seems working well except that it doesn't load the images on the page. Even when I try to access in directly: localhost/logo.png Im getting an 403 Forbidden: Forbidden You don't have permission to access /logo.png on this server. Solutions I have tried are: Using icacls to grant priviledge Folder Permissions Issue in Windows 7 manually set the permission by right clicking the image and editing the security.

    Read the article

  • Is there a way to save the installed app list on Windows 8 RP?

    - by Tural Teyyuboglu
    I'm testing Windows 8 RP. Installed tens of apps from market. What I wanna know is, is there any way to save (or maybe sync with Windows Live account) installed app list, and install these saved applications in future - RTM version of OS? I mean, somehing like on Apples' devices - icloud features function that I'm talking about. You can install apps on iPhone and sync with iCloud account. Then you can re-install these apps on another device, which signed in with your login into icloud.

    Read the article

  • How can I use dig(1) to test GeoDNS resolution for a specific IP?

    - by cnst
    There's a rumour that public domain name resolvers, like Google Public DNS, are still supposed to work with GeoDNS, because there's some field in the requests that lets them specify for which IP address they are doing a resolution, thus the authoritative servers can give a given resolver different resolutions for different final clients. What's this whole thing called as far as RFCs go, and how does one mimic such resolutions, for testing purposes, e.g. with dig(1)? Else, what other tool is available to accomplish said task?

    Read the article

  • What are the ideal settings for a Belkin WiFi Router to connect to an iPhone? [closed]

    - by user34833
    The Belkin Router (F5D8235-4 v2000) has numerous options in the setup. These are the current settings: Wireless On SSID Buster's Special Security Type WPA Encryption Type TKIP WLAN MAC Address 00:22:75:B3:58:38 WPS Enabled Guest Access Disabled SSID Belkin_N+_Guest Password/PSK NotThatSillyYet :) The iPhone is a 3g with 16GB it has no problems connecting to public networks like libraries or restaurants. But currently it won't connect to my home WiFi. Thanks for your time and help. Paul

    Read the article

  • IIS 7 Web service access

    - by Aharon Manne
    I am trying to debug a simple web service. I have IIS 7 installed on my development machine (Windows 7), and have installed the web service. I can access it from my development machine, but not from any other machine in the local network.I opened the firewall to HTTP access, and I can access the default website from other machines, so it is not the firewall.What security settings should I look at to try to allow devices on the LAN to access the web service?

    Read the article

  • How to implement a secure authentication over HTTP?

    - by Zagorax
    I know that we have HTTPS, but I would like to know if there's an algorithm/approach/strategy that grants a reasonable security level without using SSL. I have read many solution on the internet. Most of them are based on adding some time metadata to the hashes, but it needs that both server and client has the time set equal. Moreover, it seems to me that none of this solution could prevent a man in the middle attack.

    Read the article

  • snmpd.conf network range not accepted

    - by Stefan
    I am using snmpd on CentOS 6.3 and was giving a network range to the source for mapping community to security group. com2sec mynetwork 192.168.0.0/23 centreon Anyhow it is not working and I always get a timeout from the polling server. When I enter the exact ip of the polling server it works (192.168.3.180) It even works if I enter the whole netmask (255.255.252.0) Anyhow it should work according to documentation. Did I do anything wrong?

    Read the article

  • Change default root user with a new one on Ubuntu Server

    - by MultiformeIngegno
    I have a VPS, until now I used the default root user for SSH access and everything. For security reasons I'd like to use a different user for root, terminal access and sudo operations. So I created another user, gave him the sudo and every other perm. The problem is that all the system files belongs to root. What happens if I set PermitRootLogin No for root? Those files wouldn't be editable by the new root user!

    Read the article

< Previous Page | 437 438 439 440 441 442 443 444 445 446 447 448  | Next Page >