Quantcast
Channel: Spiceworks Community
Browsing all 7477 articles
Browse latest View live
↧

My Laptop is Talking to Me

for the last two days, about once every hour, i hear this man's voice come on on my lap top (can't make out everything he saying...its in english) then its followed up with some new-agey "Zemfir,...

View Article


Do you know your users passwords?

I have quite a few users who forget their password after being prompted to change it, or users forgetting their passwords, so I was thinking of keeping a log of them and storing them somewhere in AD...

View Article


make wifi secure

hye all.i have a question for all and hope so u all can help me about this question..i'm new in my cmpany and still in training process.so my boss told me to make research about wifi secure.i want to...

View Article

Win 7 Total Security 2011 virus!

Hi, I am wondering if anyone can help I one of my learners has borrowed a laptop and brought it back with a 'Win 7 Total Security 2011 virus' on it and for the life of me I just cannot remove it, can...

View Article

My Zoneminder experience...

I'll post my experience with Zoneminder.... In terms of it's web based UI....UGLY and not at all ordinary user friendly. Boss hates the interface and claims (on those grounds alone) that it doesn't...

View Article


Free Data Transfer programs

I have used windows easy transfer but that program wont let you use it if your going to tranfer data to the same xp machine after you wipe and reload it. What other programs will accomplish this? Thanks

View Article

Spy games: User trust and surveillance

This is the 132nd article in the Spotlight on IT series. If you'd be interested in writing an article on the subject of backup, security, storage, virtualization, mobile, networking, wireless, DNS,...

View Article

Tool to check Registry security settings

Does anyone know of a tool that can check Registry security settings against a baseline registry after Security Patches have been loaded? If anyone has been through a NERC audit know why I'm asking.

View Article


"12 Days of Hackmas"

http://connect.ncircle.com/t5/In-the-Loop-nCircle-News-Blog/quot-12-Days-of-Hackmas-quot/ba-p/7256 Give Yourself the Gift of Online Security

View Article


IT Auditing - For beginners

Hi guys, My company is going through an IT audit and its the first time for me. I am working with our Director but I find myself less equipped to understand the different aspects in entirety. Can...

View Article

Does SW provide security monitoring & assessment for the network?

Does SW provide security monitoring & assessment for the network? Hoping it has features to baseline then improve from

View Article

USB Flashdrive Protection

Hello, Everyone! One of our accountants came to me and is looking for suggestions on a way to password protect his flashdrive in the event it gets lost/stolen. Any suggestions? I've not been asked...

View Article

The happiest place on earth: How I recovered a stolen laptop

This is the 139th article in the Spotlight on IT series. If you'd be interested in writing an article on the subject of backup, security, storage, virtualization, mobile, networking, wireless, DNS,...

View Article


Open Source Qualys Guard?

Is there something like Qualys Guard that is free? One of our groups uses Qualys, but they won't spend the money on our side. We would like to have a vulnerability scanner that we could run reports...

View Article

Why McAfee won't change its name because of John McAfee

There's been a recurring topic of conversation in McAfee's executive meetings over the past month: John McAfee, the company's founder. John McAfee sold his security business in 1994 and has had...

View Article


Do you agree with these 10 Hard Truths IT Must accept?

What do you think about #1 (BYOD) and #9 (Social Media Security)? What hard truths about IT do you accept?http://www.citeworld.com/slideshow/76293/10-hard-truths-it-must-learn-accept-21125#slide1

View Article

Does Google docs meet HIPAA standards and other security regulations?

Does Google docs meet HIPAA standards and other security regulations for a health care organization? Please feel free to make recommendations as to other file storing, easy access and sharing service...

View Article


somebody named joker hacker hacked my website what to do now?

i am worried about the content

View Article

What is Your Password Policy?

I'm trying to get a new AD password policy put in place and would like to see what everyone else is doing. Our current policy is (brace yourselves): Min. Length: 6 Complexity: No History: 4 Max Age:...

View Article

Would anyone take this threat seriously enough to switch encryption software?

Russian firm ElcomSoft on Thursday announced the release of Elcomsoft Forensic Disk Decryptor (EFDD), a new forensic tool that can reportedly access information stored in disks and volumes encrypted...

View Article
Browsing all 7477 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>