Logging server room visitors/vendors entry and exit times?
We recently had an audit done, and one of the suggestions they had was that we begin logging when people (non-staff) enter and exit the server room(s).People like ISP employees who need at their...
View ArticlePrevent domain users from screen sharing with vendor help desks.
We work with a number of different companies and our users have logins to their websites. When a user has trouble with a site, they are supposed to contact our internal help desk. Unfortunately, many...
View ArticleUptick in Rootkits?
Has anyone else noticed an uptick in the amount of rootkits lately? it's given my Rescue discs a run and sometimes rendering them useless. I'm not asking about the best way to remove a virus or who...
View ArticleCan anyone share any experience with NVR systems with 100+ security cameras?
I'm hoping I will reach someone with experience in 100+ cameras NVR security systems.I was wondering if anyone either has over 100 cameras and what software and how many DVR/NVR they use.We currently...
View ArticleIs the Cyber War real and what are you doing about it?
Some people have argued that the cyber war is over hyped and is just an excuse for the government and Defense Department to increase their budgets and justify spying on Americans.There is no doubt the...
View ArticleOnline Service to ping cameras?
I'm wondering if anyone here has come across an online service (free or paid) that will ping a set of IP security cameras that I have installed at a facility to verify they are online, and if not then...
View ArticleRidiculous places users store passwords?
Hey there Spiceheads! The creative team at Spiceworks Studios is making a fun commercial for our friends over at Ping Identity and we need your help! The topic? Crazy (some would say stupid) places...
View ArticleInternet
bom diatenho UMA internet los da net Casa com wi-fi e mando hum cabo de Rede parágrafo hum Vizinho atraves de hum Roteador, queria saber se ma Como Descobrir se elemento ta usando wi-fi outra la?
View ArticleSophisticated Scam Of The Week: Cell Phone Voucher
(Forward to your end-users. This is a nasty one.)There's a fresh, well thought-out social engineering scam sticking up its ugly head right now. The bad guys are promising cell phone users amounts of...
View ArticleHelp alpha test a new Google Authenticator based 2FA server
Hi,I'm looking for a few people to help test a new 2FA server that allows people to use Google Authenticator to log into a VPN that we've been developingWe built the software as a drop-in replacement...
View ArticleJRAT Targets UK and UAE in Payment Certificates Spam Campaign
Every day, it just keeps getting messier for anyone involved in IT. Especially if you are part of your company's network security team...which, let's face, everyone is.Our man in Dublin Lionel Payet...
View ArticleVulnerability Scan for SMB
Hello,I'm looking for a vulnerability scan program for one of my clients. They have roughly 30 Employees & 30 Computers and are in the Medical field.I'd like to find a vulnerability scan program we...
View ArticleSAYING GOOD BYE TO AMERICAN BULL SHIT! :( (moving from gmail)
Hello guys. I'm tired of American Espionage shit (NSA, FBI, gmail, dropbox, skype, facebook...) im moving all my accounts to different approach than google or any USA based company its my personal...
View Articlehow to find out if there is other SMTP on network
Hello.I believe I have a rouge Pc on my network that been "bot 'ted" and is sending out spam, but is there and app / technic that will allow me to work out which device ?I have lock port 25 down on my...
View ArticleKaspersky causing lots of problems, even when disabled...
Hey all, hopefully someone can come up with a better solution than I have to my problem. We've just moved to Kaspersky Security Center 10 with Endpoint 10 and it's been doing some really strange...
View ArticleDNS hijacking and you: Zombie computers, manipulation and covering your butt
This is the 293rd article in the Spotlight on IT series. If you'd be interested in writing an article on the subject of backup, security, storage, virtualization, mobile, networking, wireless, cloud...
View ArticleCisco asa 5505 8.2 port range forwarding
I have a cisco asa 5505 running software version 8.2 I do not have a smart net contract in order to upgrade the software. I need to forward a large range of ports to the internal voip server. What is...
View ArticleComplaince with Gramm-Leach-Bliley-Act
I have been given the task of ensuring our systems meet the Gramm-Leach-Bliley-Act.I am reading up on it now.Can someone point me in the direction to find the IT needs?I need to come up with a plan and...
View ArticleBlood in the Water: Bitcoin Woes Cause Attackers to Converge
Virtual greetings Spicecoin Miners...After toiling for a few years in obscurity, suddenly Bitcoin is everywhere...which makes it a huge target for the bad guys.Our man in Dublin, Sr Information...
View ArticleWASP (Barcode Scanners)
Spiceheads,I have been diligently slapping bar coded asst tags on all of our equipment.Now it is time to actually "shoot" those bar codes into a database of some sort (yes, i know - i put the cart...
View Article