My Laptop is Talking to Me
for the last two days, about once every hour, i hear this man's voice come on on my lap top (can't make out everything he saying...its in english) then its followed up with some new-agey "Zemfir,...
View ArticleDo you know your users passwords?
I have quite a few users who forget their password after being prompted to change it, or users forgetting their passwords, so I was thinking of keeping a log of them and storing them somewhere in AD...
View Articlemake wifi secure
hye all.i have a question for all and hope so u all can help me about this question..i'm new in my cmpany and still in training process.so my boss told me to make research about wifi secure.i want to...
View ArticleWin 7 Total Security 2011 virus!
Hi, I am wondering if anyone can help I one of my learners has borrowed a laptop and brought it back with a 'Win 7 Total Security 2011 virus' on it and for the life of me I just cannot remove it, can...
View ArticleMy Zoneminder experience...
I'll post my experience with Zoneminder.... In terms of it's web based UI....UGLY and not at all ordinary user friendly. Boss hates the interface and claims (on those grounds alone) that it doesn't...
View ArticleFree Data Transfer programs
I have used windows easy transfer but that program wont let you use it if your going to tranfer data to the same xp machine after you wipe and reload it. What other programs will accomplish this? Thanks
View ArticleSpy games: User trust and surveillance
This is the 132nd article in the Spotlight on IT series. If you'd be interested in writing an article on the subject of backup, security, storage, virtualization, mobile, networking, wireless, DNS,...
View ArticleTool to check Registry security settings
Does anyone know of a tool that can check Registry security settings against a baseline registry after Security Patches have been loaded? If anyone has been through a NERC audit know why I'm asking.
View Article"12 Days of Hackmas"
http://connect.ncircle.com/t5/In-the-Loop-nCircle-News-Blog/quot-12-Days-of-Hackmas-quot/ba-p/7256 Give Yourself the Gift of Online Security
View ArticleIT Auditing - For beginners
Hi guys, My company is going through an IT audit and its the first time for me. I am working with our Director but I find myself less equipped to understand the different aspects in entirety. Can...
View ArticleDoes SW provide security monitoring & assessment for the network?
Does SW provide security monitoring & assessment for the network? Hoping it has features to baseline then improve from
View ArticleUSB Flashdrive Protection
Hello, Everyone! One of our accountants came to me and is looking for suggestions on a way to password protect his flashdrive in the event it gets lost/stolen. Any suggestions? I've not been asked...
View ArticleThe happiest place on earth: How I recovered a stolen laptop
This is the 139th article in the Spotlight on IT series. If you'd be interested in writing an article on the subject of backup, security, storage, virtualization, mobile, networking, wireless, DNS,...
View ArticleOpen Source Qualys Guard?
Is there something like Qualys Guard that is free? One of our groups uses Qualys, but they won't spend the money on our side. We would like to have a vulnerability scanner that we could run reports...
View ArticleWhy McAfee won't change its name because of John McAfee
There's been a recurring topic of conversation in McAfee's executive meetings over the past month: John McAfee, the company's founder. John McAfee sold his security business in 1994 and has had...
View ArticleDo you agree with these 10 Hard Truths IT Must accept?
What do you think about #1 (BYOD) and #9 (Social Media Security)? What hard truths about IT do you accept?http://www.citeworld.com/slideshow/76293/10-hard-truths-it-must-learn-accept-21125#slide1
View ArticleDoes Google docs meet HIPAA standards and other security regulations?
Does Google docs meet HIPAA standards and other security regulations for a health care organization? Please feel free to make recommendations as to other file storing, easy access and sharing service...
View Articlesomebody named joker hacker hacked my website what to do now?
i am worried about the content
View ArticleWhat is Your Password Policy?
I'm trying to get a new AD password policy put in place and would like to see what everyone else is doing. Our current policy is (brace yourselves): Min. Length: 6 Complexity: No History: 4 Max Age:...
View ArticleWould anyone take this threat seriously enough to switch encryption software?
Russian firm ElcomSoft on Thursday announced the release of Elcomsoft Forensic Disk Decryptor (EFDD), a new forensic tool that can reportedly access information stored in disks and volumes encrypted...
View Article