Search Results

Search found 30819 results on 1233 pages for 'software security'.

Page 683/1233 | < Previous Page | 679 680 681 682 683 684 685 686 687 688 689 690  | Next Page >

  • What do I need to use Smart card for windows login (no domain, just regular single local machine)

    - by Muhammad Nour
    I have a reader from ACS "ACR83" and a brand new card from the same place ACO3-32 as a development kit and I need to use both of them to login into my laptop locally I am not a part of domain, I am using Windows xp SP3 what should I do to enable smart card login do I need third party software to do this without domain or should it be a domain environment to be able to do such a thing this is the first time dealing with smart card, so I hope some one will help me Doing this

    Read the article

  • PCI-DSS compliance for business with only swipe terminals [migrated]

    - by rowatt
    I support the IT infrastructure for a small retail business which is now required to undergo a PCI-DSS assessment. The payment service and terminal provider (Streamline) has asked that we use Trustwave to do the PCI-DSS certification. The problem I face is that if I answer all questions and follow Trustwave's requirements to the letter, we will have to invest significantly in networking equipment to segment LANs and /or do internal vulnerability scanning, while at the same time Streamline assures me that the terminals we have (Verifone VX670-B and MagIC3 X-8) are secure, don't store any credit card information and are PCI-DSS compliant so by implication we don't need to take any action to ensure their network security. I'm looking for any suggestions as to how we can most easily meet the networking requirements for PCI-DSS. Some background on our current network setup: single wired LAN, also with WiFi turned on (though if this creates any PCI-DSS complexities we can turn it off). single Netgear ADSL router. This is the only firewall we have in place, and the firewall is out the box configuration (i.e. no DMZ, SNMP etc). Passwords have been changed though :-) a few windows PCs and 2 windows based tills, none of which ever see any credit card information at all. two swipe terminals. Until a few months ago (before we were told we had to be PCI-DSS certified) these terminals did auth/capture over the phone. Streamline suggested we moved to their IP Broadband service, which instead uses an SSL encrypted channel over the internet to do auth/capture, so we now use that service. We don't do any ecommerce or receive payments over the internet. All transactions are either cardholder present, or MOTO with details given over phone and typed direct into terminal. We're based in the UK. As I currently understand it we have three options in order to get PCI-DSS certification. segment our network so the POS terminals are isolated from all PCs, and set up internal vulnerability scanning on that network. don't segment the network, and have to do more internal scanning and have more onerous management of PCs than I think we need (for example, though the tills are Windows based, they are fully managed so I have no control over software update policies, anti virus etc). All PCs have anti virus (MSE) and windows updates automatically applied, but we don't have any centralised go back to auth/capture over phone lines. I can't imagine we are the first merchant to be in this situation. I'm looking for any recommendations a simple, cost effective way to be PCI-DSS compliant - either by doing 1 or 2 above with (hopefully) simple and inexpensive equipment/software, or any other ways if there's a better way to do this. Or... should we just go back to the digital stone age and do auth/capture over the phone, which means we don't need to do anything on our network to be PCI-DSS certified?

    Read the article

  • Download Virus/Malware Purposefully

    - by Matt Hanson
    Where can I download a virus, work, trojan, etc. for analysis? Yes, I'm actually hunting for malware, rather than keeping it at bay and hiding behind antivirus software and firewalls. I plan to analyze it in a lab for a project, but don't know where to even begin finding one.

    Read the article

  • I can't get the Samsung PC Studio to work on Vista or Windows 7

    - by Mike Farrington
    Has anyone got a solution to this problem have asked Samsung but no reply yet! The software installs OK and the drivers, it sees the Tocco Lite when connected but will not actually connect! error message can't change mode or can't connect as "no response from the device because it is in the initializing stage. Try again after the initialization has completed" but it never does. Please Help!!! Mike

    Read the article

  • How do I profile the startup process in OS X 10.5?

    - by Alex Mcp
    When I bought my MBP 2.2 GHZ in 2007, it got from dead to an active dock in about 18 seconds, and now it takes about 1:30 to get a fully responsive home screen. I want to find a way to profile the various things it does when it starts up so I can begin tuning it a bit. Any good software or other recommendations for this process?

    Read the article

  • Sprint MMS: APN, WAP, and MMSC?

    - by colithium
    I am attempting to use some third party software to send an MMS Message through an attached Sprint mobile phone. The problem is, I cannot find Sprint's specific configuration anywhere. Example configuration for many providers can be found here. Specifically, I need: APN (Access Point Name) WAP (Wireless Application Protocol) Gateway Provider MMSC (MMS Store and Forward Server) Potentially a Login/Password if Used Note: I already have a request into ActiveXperts, no response yet.

    Read the article

  • Extremely slow network directory subfolder listing from QNAP NAS in OS X

    - by Josh Newman
    Having an issue where I have a folder on a QNAP NAS (TS-439P II+) with over 68,000 subfolders within it. I can browse it quickly and almost instantaneously within Windows 7 via samba, however in OSX 10.6.8, it takes nearly 10+ minutes to display the subfolders, using both samba and AFP. Hoping there is an easy solution - we can't break the folders into smaller subfolders due to a requirement of proprietary software that accesses the sub folders. I've tried the fixes suggested here, which don't seem to help: http://www.macwindows.com/snowleopard-filesharing.html#030311b

    Read the article

  • Cheap hackable portable mp3 player

    - by monov
    I want something that will: play mp3s fit in my pocket have a 3.5mm audio jack let me write software for it cost $50 max I guess a cheap mobile phone could satisfy that too. Don't care much for brand names. Any ideas?

    Read the article

  • autologin on webpage?

    - by blackjack
    hi i need to type in my username and pass to connect to internet through a captive portal provided by my isp is there a automatic way(any software/script) to type in info(in username and pass fields) and login without me typing and pressing that %$^& login button every time on my browser(chrome)?

    Read the article

  • Layman's book for understanding computer networks

    - by srid
    The good thing about books targeting a layman is that it is usually very engaging to read (not dry and boring like, say, school/university books). Charles Petzold's Code: The Hidden Language of Computer Hardware and Software does this for explaining the underlying hardware in computers. Is there a similar book for understanding computer networking?

    Read the article

  • Terminology: Bounce versus restart

    - by Steve Kuo
    I've always heard and used the term "reboot" or "restart" to indicate restarting a server, service or software module. "reboot the server" "restart Tomcat" "restart the XYZ service" Does "bounce" mean something different or is it just a duplicate term for restart? How is "bounce" any different than restart or reboot?

    Read the article

  • Squid authentication encryption

    - by barbarossa12d
    Hi, I use Squid and the users must authenticate. The users are authenticating in cleartext. I found tutorials about stunnel (http://www.jeffyestrumskas.com/?page_id=3), but the clients also need this software. Is there no possibility that for user authentication SSL (or some other encryption technology) can be used?. Thanks.

    Read the article

  • Weird characters while merging text files

    - by Mirage
    When i open the text file in windows the text looks fine. But when i use text miler merger software then it shows some weird chinese characters for that files. but i reads ok the files after. how can i make all the files to same encoding so that they appear readable thanks

    Read the article

  • Postfix flow/hook reference, or high-level overview?

    - by threecheeseopera
    The Postfix MTA consists of several components/services that work together to perform the different stages of delivery and receipt of mail; these include the smtp daemon, the pickup and cleanup processes, the queue manager, the smtp service, pipe/spawn/virtual/rewrite ... and others (including the possibility of custom components). Postfix also provides several types of hooks that allow it to integrate with external software, such as policy servers, filters, bounce handlers, loggers, and authentication mechanisms; these hooks can be connected to different components/stages of the delivery process, and can communicate via (at least) IPC, network, database, several types of flat files, or a predefined protocol (e.g. milter). An old and very limited example of this is shown at this page. My question: Does anyone have access to a resource that describes these hooks, the components/delivery stages that the hook can interact with, and the supported communication methods? Or, more likely, documentation of the various Postfix components and the hooks/methods that they support? For example: Given the requirement "if the recipient primary MX server matches 'shadysmtpd', check the recipient address against a list; if there is a match, terminate the SMTP connection without notice". My software would need to 1) integrate into the proper part of the SMTP process, 2) use some method to perform the address check (TCP map server? regular expressions? mysql?), and 3) implement the required action (connection termination). Additionally, there will probably be several methods to accomplish this, and another requirement would be to find that which best fits (ex: a network server might be faster than a flat-file lookup; or, if a large volume of mail might be affected by this check, it should be performed as early in the mail process as possible). Real-world example: The apolicy policy server (performs checks on addresses according to user-defined rules) is designed as a standalone TCP server that hooks into Postfix inside the smtpd component via the directive 'check_policy_service inet:127.0.0.1:10001' in the 'smtpd_client_restrictions' configuration option. This means that, when Postfix first receives an item of mail to be delivered, it will create a TCP connection to the policy server address:port for the purpose of determining if the client is allowed to send mail from this server (in addition to whatever other restrictions / restriction lookup methods are defined in that option); the proper action will be taken based on the server's response. Notes: 1)The Postfix architecture page describes some of this information in ascii art; what I am hoping for is distilled, condensed, reference material. 2) Please correct me if I am wrong on any level; there is a mountain of material, and I am just one man ;) Thanks!

    Read the article

  • Ubuntu Equivalent of Unix Command cp -n

    - by Ted Karmel
    A software I need to install on my Ubuntu Hardy has a MAKE file which includes the command cp -n. However, I get an error stating the -n is an invalid option. The command will work on a Mac terminal but I need it to work on Ubuntu. Does anyone know the equivalent command for Ubuntu? Thanks.

    Read the article

  • Why not switch to Linux?

    - by Ehtyar
    I've had the desire to move to Linux for desktop computing for some time, as the OS just suits me, I think, better than Windows. I've not yet moved from Windows for a few reasons: It's used in my workplace. I have an extensive application base that does whatever I need (and they're all on a portable hdd) I am familiar developing software on Windows. So, what about Linux keeps you from moving to it, or what does your current desktop OS offer that Linux does not?

    Read the article

  • How to stop the Google Update background tool?

    - by Dimitri C.
    On my Windows Vista PC, there is always an instance of "GoogleUpdate.exe" running. I find this annoying, so I'd like to make sure it doesn't start automatically. This proves to be not so easy, as I have tried these solutions: I disabled the "Google updateservice" service I removed the registry section "HKCU\Software\Microsoft\Windows\CurrentVersion\Run\Google Update" None of these worked. The registry section is simply re-added. Does anyone know the trick to avoid GoogleUpdate.exe to be started after booting the system?

    Read the article

  • What Are Some Good Open Source Alternatives to Active Directory?

    - by Laz
    I'm looking for a good open-source alternative to active directory that can handle: Authorization/Authentication Group Policy Replication and Trust Monitoring In addition, are there any consolidated systems out there that handle these responsibilities? Edit: Since a lot have asked for more details, I am trying to offer a service setting up an infrastructure for organizations, hardware/software setups, right now I am looking at a Linux stack, both desktops and servers, however a hybrid stack is possible, and I am investigating alternatives.

    Read the article

< Previous Page | 679 680 681 682 683 684 685 686 687 688 689 690  | Next Page >