Remember
Register
TechnoConnect
Home
Blogs
Questions
Unanswered
Tags
Users
Ask a Question
TechnoBind
Events
Followers (28)
Article under tag security
REST and RESTful API
How you can Secure your Mobile Devices
Recent posts under tag security
All
Questions
Polls
Blogs
0
votes
0
answers
How to defend against web application firewall evasion?
posted
Jul 7, 2023
by
Jasraj Santoshrao Deshpande
security
0
votes
1
answer
What are the risks associated with IAM, PAM,EPM solutions?
posted
Jun 12, 2023
by
Jasraj Santoshrao Deshpande
security
data risk
0
votes
1
answer
What are firewall evasion techniques?
posted
Jun 9, 2023
by
Jasraj Santoshrao Deshpande
security
0
votes
0
answers
What is the concept of "least privilege" in the context of security posture?
posted
Jun 6, 2023
by
Abhishek A. Patil - Bangalore
security
0
votes
2
answers
What is the role of an intrusion detection system (IDS) in a security posture?
posted
Jun 6, 2023
by
Abhishek A. Patil - Bangalore
security
+1
vote
1
answer
What is the role of encryption in maintaining a strong security posture?
posted
Jun 6, 2023
by
Soumyadeep
security
0
votes
2
answers
What is SNMP Monitoring & how its work?
posted
Mar 22, 2022
by
Akash Deshbhratar
security
0
votes
1
answer
What are different types of attacks in cyber security and how to prevent it?
posted
Mar 22, 2022
by
Aelina Momin
security
0
votes
REST and RESTful API
posted
Mar 7, 2022
by
Aelina Momin
security
0
votes
1
answer
What is encryption key management?
posted
Feb 27, 2019
by
anonymous
data
security
software encryption
0
votes
0
answers
What is Digital Envelope Encryption?
posted
Feb 27, 2019
by
anonymous
software encryption
data protection
security
data
0
votes
2
answers
What is difference between Tokenization and Encryption?
posted
Feb 27, 2019
by
Adish Jain
security
software encryption
data
+1
vote
0
answers
What are the real time applications of Divergence?
posted
Jan 28, 2019
by
Adish Jain
security
+1
vote
0
answers
What are the real time applications of asynchronous machines?
posted
Jan 28, 2019
by
Adish Jain
security
+1
vote
0
answers
What are the real time applications of curl?
posted
Jan 28, 2019
by
Adish Jain
security
+1
vote
0
answers
What are real time applications of synchronous machines?
posted
Jan 28, 2019
by
Adish Jain
security
+1
vote
0
answers
What are the real time applications of different programming languages?
posted
Jan 28, 2019
by
Adish Jain
security
+1
vote
0
answers
What are the real time applications of hashing?
posted
Jan 28, 2019
by
Adish Jain
security
+1
vote
0
answers
What are the real time applications of Roopa?
posted
Jan 28, 2019
by
Adish Jain
security
+1
vote
0
answers
What are the real time applications of JFET?
posted
Jan 28, 2019
by
Adish Jain
security
+1
vote
0
answers
What are the real time applications of AES Algorithm?
posted
Jan 28, 2019
by
Adish Jain
security
0
votes
1
answer
What is SOAP and WSDL?
posted
Oct 11, 2017
by
Abhishek Maheshwari
data
security
0
votes
1
answer
What is SSL connection and an SSL session?
posted
Oct 11, 2017
by
Abhishek Maheshwari
data
security
0
votes
1
answer
What is the difference between a Black Hat and a White Hat?
posted
Oct 6, 2017
by
anonymous
data
security
0
votes
0
answers
What are the most important aspects of a cloud security policy?
posted
Oct 4, 2017
by
Abhishek Maheshwari
cloud
security
0
votes
0
answers
Is there a difference in the various providers security?
posted
Sep 20, 2017
by
anonymous
data
security
0
votes
1
answer
What are your first three steps when securing a server?
posted
Sep 12, 2017
by
anonymous
data
security
+1
vote
0
answers
If we had to both encrypt and compress data during transmission, which could we do first, and why?
posted
Aug 29, 2017
by
Abhishek Maheshwari
data
security
0
votes
0
answers
What is Salting, and why is it used?
posted
Aug 29, 2017
by
anonymous
data
security
0
votes
1
answer
What is SSL and why is it not enough when it comes to encryption?
posted
Aug 28, 2017
by
anonymous
data
security
0
votes
0
answers
Which is the most secure - SSL, TLS or HTTPS?
posted
Jun 28, 2017
by
Abhishek Maheshwari
data
security
0
votes
1
answer
What is the difference between a threat, vulnerability, and a risk?
posted
Jun 28, 2017
by
anonymous
data
security
+2
votes
How you can Secure your Mobile Devices
posted
Oct 11, 2016
by
Erika
security
mobile
+1
vote
0
answers
If my data, security, and my backup is in the cloud then what do I control?
posted
Oct 11, 2016
by
Ketan Vadnathani
cloud
backup
security
+1
vote
1
answer
What is more secure SSL or HTTPS?
posted
Aug 31, 2016
by
Abhishek Maheshwari
security
0
votes
1
answer
What’s the difference between encoding, encryption, and hashing?
posted
Aug 19, 2016
by
Abhishek Maheshwari
data protection
security
+1
vote
0
answers
What type of encryption is used to secure traffic between the management entities?
posted
Jul 25, 2016
by
Satendra Jain
security
+2
votes
1
answer
What is DoS attack? How can it be prevented?
posted
Jun 26, 2016
by
Satendra Jain
security
+2
votes
0
answers
How Cyber Security reduce storage footprint?
posted
Jun 23, 2016
by
anonymous
cyber security
security
storage footprint
storage system
0
votes
0
answers
Not opening DVD eject at shutdown in HP ProBook?
posted
Jun 22, 2016
by
anonymous
hp
security
+3
votes
1
answer
What is the Difference between SSL and TLS?
posted
May 1, 2016
by
Ajay Vg
security
+2
votes
0
answers
What are the Security in the SPI model?
posted
Apr 30, 2016
by
anonymous
security
+2
votes
0
answers
What are PCI DSS and ISO Standard in Data Storage Security?
posted
Apr 30, 2016
by
Édwige Guerin
security
storage system
+2
votes
0
answers
What is that called a 64 Bit-Block Cipher with 16 Iterations giving a 56 Bit-Key?
posted
Apr 29, 2016
by
anonymous
security
+1
vote
0
answers
What is hybrid cloud and how is it different then public cloud in terms of security?
posted
Apr 26, 2016
by
anonymous
cloud
security
+2
votes
0
answers
What it more secure in related to security - A Public Cloud or a Private Cloud and why?
posted
Apr 25, 2016
by
anonymous
security
cloud
+2
votes
1
answer
What is the difference between data protection and data security?
posted
Mar 15, 2016
by
anonymous
data protection
security
+2
votes
3
answers
Why is 2fa solution an essential component of business security?
posted
Feb 23, 2016
by
anonymous
security
...