Remember
Register
TechnoConnect
Home
Blogs
Questions
Unanswered
Tags
Users
Ask a Question
TechnoBind
Events
Followers (28)
Article under tag security
REST and RESTful API
How you can Secure your Mobile Devices
Recent questions under tag security
Recent
Polls
Unanswered
Most votes
Most views
Most answers
All
Blogs
0
votes
0
answers
How to defend against web application firewall evasion?
posted
Jul 7, 2023
by
Jasraj Santoshrao Deshpande
security
0
votes
1
answer
What are the risks associated with IAM, PAM,EPM solutions?
posted
Jun 12, 2023
by
Jasraj Santoshrao Deshpande
security
data risk
0
votes
1
answer
What are firewall evasion techniques?
posted
Jun 9, 2023
by
Jasraj Santoshrao Deshpande
security
0
votes
0
answers
What is the concept of "least privilege" in the context of security posture?
posted
Jun 6, 2023
by
Abhishek A. Patil - Bangalore
security
0
votes
2
answers
What is the role of an intrusion detection system (IDS) in a security posture?
posted
Jun 6, 2023
by
Abhishek A. Patil - Bangalore
security
+1
vote
1
answer
What is the role of encryption in maintaining a strong security posture?
posted
Jun 6, 2023
by
Soumyadeep
security
0
votes
2
answers
What is SNMP Monitoring & how its work?
posted
Mar 22, 2022
by
Akash Deshbhratar
security
0
votes
1
answer
What are different types of attacks in cyber security and how to prevent it?
posted
Mar 22, 2022
by
Aelina Momin
security
0
votes
1
answer
What is encryption key management?
posted
Feb 27, 2019
by
anonymous
data
security
software encryption
0
votes
0
answers
What is Digital Envelope Encryption?
posted
Feb 27, 2019
by
anonymous
software encryption
data protection
security
data
0
votes
2
answers
What is difference between Tokenization and Encryption?
posted
Feb 27, 2019
by
Adish Jain
security
software encryption
data
+1
vote
0
answers
What are the real time applications of Divergence?
posted
Jan 28, 2019
by
Adish Jain
security
+1
vote
0
answers
What are the real time applications of asynchronous machines?
posted
Jan 28, 2019
by
Adish Jain
security
+1
vote
0
answers
What are the real time applications of curl?
posted
Jan 28, 2019
by
Adish Jain
security
+1
vote
0
answers
What are real time applications of synchronous machines?
posted
Jan 28, 2019
by
Adish Jain
security
+1
vote
0
answers
What are the real time applications of different programming languages?
posted
Jan 28, 2019
by
Adish Jain
security
+1
vote
0
answers
What are the real time applications of hashing?
posted
Jan 28, 2019
by
Adish Jain
security
+1
vote
0
answers
What are the real time applications of Roopa?
posted
Jan 28, 2019
by
Adish Jain
security
+1
vote
0
answers
What are the real time applications of JFET?
posted
Jan 28, 2019
by
Adish Jain
security
+1
vote
0
answers
What are the real time applications of AES Algorithm?
posted
Jan 28, 2019
by
Adish Jain
security
0
votes
1
answer
What is SOAP and WSDL?
posted
Oct 11, 2017
by
Abhishek Maheshwari
data
security
0
votes
1
answer
What is SSL connection and an SSL session?
posted
Oct 11, 2017
by
Abhishek Maheshwari
data
security
0
votes
1
answer
What is the difference between a Black Hat and a White Hat?
posted
Oct 6, 2017
by
anonymous
data
security
0
votes
0
answers
What are the most important aspects of a cloud security policy?
posted
Oct 4, 2017
by
Abhishek Maheshwari
cloud
security
0
votes
0
answers
Is there a difference in the various providers security?
posted
Sep 20, 2017
by
anonymous
data
security
0
votes
1
answer
What are your first three steps when securing a server?
posted
Sep 12, 2017
by
anonymous
data
security
+1
vote
0
answers
If we had to both encrypt and compress data during transmission, which could we do first, and why?
posted
Aug 29, 2017
by
Abhishek Maheshwari
data
security
0
votes
0
answers
What is Salting, and why is it used?
posted
Aug 29, 2017
by
anonymous
data
security
0
votes
1
answer
What is SSL and why is it not enough when it comes to encryption?
posted
Aug 28, 2017
by
anonymous
data
security
0
votes
0
answers
Which is the most secure - SSL, TLS or HTTPS?
posted
Jun 28, 2017
by
Abhishek Maheshwari
data
security
0
votes
1
answer
What is the difference between a threat, vulnerability, and a risk?
posted
Jun 28, 2017
by
anonymous
data
security
+1
vote
0
answers
If my data, security, and my backup is in the cloud then what do I control?
posted
Oct 11, 2016
by
Ketan Vadnathani
cloud
backup
security
+1
vote
1
answer
What is more secure SSL or HTTPS?
posted
Aug 31, 2016
by
Abhishek Maheshwari
security
0
votes
1
answer
What’s the difference between encoding, encryption, and hashing?
posted
Aug 19, 2016
by
Abhishek Maheshwari
data protection
security
+1
vote
0
answers
What type of encryption is used to secure traffic between the management entities?
posted
Jul 25, 2016
by
Satendra Jain
security
+2
votes
1
answer
What is DoS attack? How can it be prevented?
posted
Jun 26, 2016
by
Satendra Jain
security
+2
votes
0
answers
How Cyber Security reduce storage footprint?
posted
Jun 23, 2016
by
anonymous
cyber security
security
storage footprint
storage system
0
votes
0
answers
Not opening DVD eject at shutdown in HP ProBook?
posted
Jun 22, 2016
by
anonymous
hp
security
+3
votes
1
answer
What is the Difference between SSL and TLS?
posted
May 1, 2016
by
Ajay Vg
security
+2
votes
0
answers
What are the Security in the SPI model?
posted
Apr 30, 2016
by
anonymous
security
+2
votes
0
answers
What are PCI DSS and ISO Standard in Data Storage Security?
posted
Apr 30, 2016
by
Édwige Guerin
security
storage system
+2
votes
0
answers
What is that called a 64 Bit-Block Cipher with 16 Iterations giving a 56 Bit-Key?
posted
Apr 29, 2016
by
anonymous
security
+1
vote
0
answers
What is hybrid cloud and how is it different then public cloud in terms of security?
posted
Apr 26, 2016
by
anonymous
cloud
security
+2
votes
0
answers
What it more secure in related to security - A Public Cloud or a Private Cloud and why?
posted
Apr 25, 2016
by
anonymous
security
cloud
+2
votes
1
answer
What is the difference between data protection and data security?
posted
Mar 15, 2016
by
anonymous
data protection
security
+2
votes
3
answers
Why is 2fa solution an essential component of business security?
posted
Feb 23, 2016
by
anonymous
security
...