Quantcast
Channel: Spiceworks Community
Browsing all 7477 articles
Browse latest View live

Outdoor PoE 1080p Surveillance Cameras?

A while back I installed a pretty cheap Samsung surveillance system for a client who was dealing with some petty thefts. It's an analog system that uses CAT5 cable to connect the cameras to the DVR....

View Article


Angry ex-employee still has email access: Have we been hacked?

This is the 38th article in the Spotlight on IT series. If you'd be interested in writing an article on the subject of backup, security, storage, virtualization or MSPs for the series PM Eric to get...

View Article


Which SSL cert company should I go with?

We have a management system that has a web front end and SQL as the back end. We have kept outside access locked out, but now we need to allow external access which will involve making the management...

View Article

How do i write protect a usb thumb drive from being deleted

i am trying to find a way to write protect a usb thumb drive. I want to load files, write protect, then give them to employees to look at only. Most of the software either write protects it on a...

View Article

Yahoo mail account hacked

Hello all; My friend's yahoo mail account was hacked,but however he has managed to get in. However we found a different email being registred under security settings which we deleted. But when we give...

View Article


Network Security Lunch & Learn Event Topics

Arctic Wolf Networks is considering hosting a network security lunch and learn session/roadshow. This event would not be a sales pitch, but a useful session on helping businesses enhance their...

View Article

Anyone who runs kaspersky endpoint security on windows 8?

Hope I am not alone waiting for kaspersky endpoint security 10 on windows 8.1...http://support.kaspersky.com/10586

View Article

Need Software for File Auditing on Server

I am looking for software to record file activity on my Windows Server 2012R2 server such as read, delete, change. Is there any freeware out there that does this or maybe something that's reasonably...

View Article


PCI DSS v3.0 Compliance – What’s New? An InfoGraphic

Last month, the PCI Security Standards Council (PCI SSC) officially released the v3.0 compliance standards, but it will take some time before everyone involved (merchants, service providers and...

View Article


Kaspersky replace Esafe ?

At the moment we have Esafe for anti spam solution but the software is going to stop updating half way this year. Now I was thinking about using kaspersky ant-spam module what we already have within...

View Article

ITAR requirements

Hello experts has any of you had to setup your network to be ITAR compliant? I have been doing some research on this and have not found any specific guidelines to follow to be ITAR compliant. All I...

View Article

Malware to take over a PC - User blissfully unaware

Is anyone aware of any malware whereby a Win7 PC is turned into a "drone" that can load software, download and upload files and generally be used for no-goodness while the user is unaware. Win7 using...

View Article

Mobotix cameras can't add to inventory

I did a scan of my network and I can see the ip address for the cameras. When I put in the http login information it logs in and there is no issue there. The issue is that it does not show any...

View Article


Computer Start up Circle Dell screen

Hey Spiceheads. I have an issue. I was working on a Dell Inspiron Laptop and all it does is circle to the Dell screen. I tried to re image the computer with no luck as I cannot get into the Bios or...

View Article

Ridiculous places users store passwords?

Hey there Spiceheads! The creative team at Spiceworks Studios is making a fun commercial for our friends over at Ping Identity and we need your help! The topic? Crazy (some would say stupid) places...

View Article


Vertical Password Guessing Attacks Part II

Grrrrrrreetings Spiceheads.... Today we are back with the second installment from our Senior Security Consultant (read that as resident badass) Vince Kornacki. Vince has been with us for 10 years and...

View Article

Symantec Security Expert talking mobile security today at 5.00 EST

Sorry for the late notice Spicefolk, but I thought you would be interested in this one. One of Symantec's top Security researchers, Kevin Haley, Director of Security Response, is going to be live on...

View Article


Make PDF "copy protected" to avoid duplication?

OK, so I know this may sound like a somewhat unusual question. I also know that "trying to keep bits from being copied is like trying to keep water from getting wet". But we have a request here at...

View Article

Reader XI - Do you use Protected View?

Kind of as the subject really. Any issues? Any kickback from end users? I'm trialling it on our test group and so far so good in terms of nothing breaking, though I have had one person complain that...

View Article

New startup "Shape Security" uses real-time polymorphic code to stop cybercrime

Anyone read about this yet? It seems pretty exciting, and ZDNet has a good article @ http://www.zdnet.com/shape-security-a-better-security-mousetrap-for-the-enterprise-7000025268/Network World has a...

View Article
Browsing all 7477 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>