Quantcast
Channel: Spiceworks Community
Browsing all 7477 articles
Browse latest View live

Laptops grew legs...

Over the weekend we had a break in at one of our remote sites.  Along with the stuff they took were two nearly new Lenovo Thinkpad's.  High End models..  The laptops were being used by two designers....

View Article


Do you block xls attachments

Do you recommend blocking xls or doc attachments from outside your organization ? 

View Article


HIPAA Compliant Email

Hi, I work for a non-profit organization that deals with PHI. We need to be able to send emails that contain PHI to other providers, schools, parents etc. I have been looking at a lot of solutions for...

View Article

Missing required Permissions manifest attribute in main jar

I had a problem accessing my Cisco ASDM.  I would get the error, "Missing required Permissions manifest attribute in main jar".  I looked around trying to find the answer, no luck, so I went onto an...

View Article

Symantec Endpoint Protection Cloud Service

How many people out there are using the Symantec Endpoint Protection cloud service? I am looking for pros and cons.  It's not my call to make the decision not that I am for or against, but I will be...

View Article


Application Deployment Versus Information Security

Here's a great question to everyone out there who has to manage software deploymentsHow are you handling security of your critical business system applications versus access to the Information?In my...

View Article

Image may be NSFW.
Clik here to view.

Sticking With WinXP? 10 Things You Must Do

I'm sure you know that April 8 2014, Microsoft will stop supporting Windows XP and stop creating security updates for XP as well. That means that when after April 8, 2014 another security bug is found...

View Article

Image may be NSFW.
Clik here to view.

Pre-installed malware turns up on new phones

A fake version of Netflix that steals personal data and sends it to Russia has been found on several phone modelsDavid Jevans, CTO and founder of Marble Security, recently received some bad feedback...

View Article


How insecure is it to bake the key and IV into a program that uses AES/Rijndael?

A vendor recently hand-waved a lot of my questions about his company's software. This software stores user passwords, credit card numbers, and probably other things in reversible encryption of some...

View Article


MobileIron MDM Integration

Has anyone integrated Appthority into MI? Any takeaways?

View Article

Anyone use Mandiant Redline?

I am updating my IR disk and was looking at Mandiant's Redline for Host analysis. Has anyone every used it? Good or bad? Anyone use an alternative for memory forensics?

View Article

How anonymous is TOR and ProxyChains for pentesting?

As an entry level in to pentesting and InfoSec- I have setup a small lab for testing out vulnerabilities and such. I use TOR and ProxyChains for obvious reasons. However, I have not tested it outside...

View Article

alternatives to deep freeze

Hello all,I work in a non profit and dont have a huge budget. can you reccommend software that prevents users from making chages to the cmputer?I am using deep freeze now but it isexpensve. thank you!

View Article


Best Way to Centrally Store Passwords?

All,I'm looking for suggestions on the best way to centrally store a set of passwords for a small IT team (so that the entire IT team can have access to those passwords).Of course, using an Excel or...

View Article

Need suggestions for multi user password manager software

Hi, we are looking at replacing our current password management software since it doesnt support multiple users. It can be opened by several users at the same time but the last one to do a save saves...

View Article


Securing data from going outside to office.

Hi there,Our environment, We have Windows Server 2012 R2 as a file server and the whole network is in Workgroup.Users used to access the data by the usernames allocated to each.My Question is :...

View Article

Need help selecting IP cameras

We have 32 different offices and stores and would like to upgrade our camera systems to IP based. As with most anything electronic there are 1000's of options to choose from. Unfortunately I don't live...

View Article


Data encryption on a mapped drive

What I am looking for is software that will have a user have software on their machine that when a user saves or access data on a mapped drive it will encrypt them. The server does need to see the...

View Article

Does anyone still believe passwords are enough to secure a system?

The North Dakota University System (NDUS) is notifying more than 290,000 former and current students and roughly 780 faculty and staff that their personal information – including Social Security...

View Article

Cisco ASA - Public IP Block List

We had a scare on our network today where we thought we might have had a PC with a Crypto Locker infection that, THANKFULLY, turned out to be only the Homeland Security virus and only on one PC. That...

View Article
Browsing all 7477 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>