Quantcast
Channel: Spiceworks Community
Browsing all 7477 articles
Browse latest View live

Logging server room visitors/vendors entry and exit times?

We recently had an audit done, and one of the suggestions they had was that we begin logging when people (non-staff) enter and exit the server room(s).People like ISP employees who need at their...

View Article


Prevent domain users from screen sharing with vendor help desks.

We work with a number of different companies and our users have logins to their websites. When a user has trouble with a site, they are supposed to contact our internal help desk. Unfortunately, many...

View Article


Uptick in Rootkits?

Has anyone else noticed an uptick in the amount of rootkits lately?  it's given my Rescue discs a run and sometimes rendering them useless.  I'm not asking about the best way to remove a virus or who...

View Article

Can anyone share any experience with NVR systems with 100+ security cameras?

I'm hoping I will reach someone with experience in 100+ cameras NVR security systems.I was wondering if anyone either has over 100 cameras and what software and how many DVR/NVR they use.We currently...

View Article

Is the Cyber War real and what are you doing about it?

Some people have argued that the cyber war is over hyped and is just an excuse for the government and Defense Department to increase their budgets and justify spying on Americans.There is no doubt the...

View Article


Online Service to ping cameras?

I'm wondering if anyone here has come across an online service (free or paid) that will ping a set of IP security cameras that I have installed at a facility to verify they are online, and if not then...

View Article

Ridiculous places users store passwords?

Hey there Spiceheads! The creative team at Spiceworks Studios is making a fun commercial for our friends over at Ping Identity and we need your help! The topic? Crazy (some would say stupid) places...

View Article

Internet

bom diatenho UMA internet los da net Casa com wi-fi e mando hum cabo de Rede parágrafo hum Vizinho atraves de hum Roteador, queria saber se ma Como Descobrir se elemento ta usando wi-fi outra la?

View Article


Image may be NSFW.
Clik here to view.

Sophisticated Scam Of The Week: Cell Phone Voucher

(Forward to your end-users. This is a nasty one.)There's a fresh, well thought-out social engineering scam sticking up its ugly head right now. The bad guys are promising cell phone users amounts of...

View Article


Help alpha test a new Google Authenticator based 2FA server

Hi,I'm looking for a few people to help test a new 2FA server that allows people to use Google Authenticator to log into a VPN that we've been developingWe built the software as a drop-in replacement...

View Article

Image may be NSFW.
Clik here to view.

JRAT Targets UK and UAE in Payment Certificates Spam Campaign

Every day, it just keeps getting messier for anyone involved in IT.  Especially if you are part of your company's network security team...which, let's face, everyone is.Our man in Dublin Lionel Payet...

View Article

Vulnerability Scan for SMB

Hello,I'm looking for a vulnerability scan program for one of my clients. They have roughly 30 Employees & 30 Computers and are in the Medical field.I'd like to find a vulnerability scan program we...

View Article

SAYING GOOD BYE TO AMERICAN BULL SHIT! :( (moving from gmail)

Hello guys. I'm tired of American Espionage shit (NSA, FBI, gmail, dropbox, skype, facebook...) im moving all my accounts to different approach than google or any USA based company its my personal...

View Article


how to find out if there is other SMTP on network

Hello.I believe I have a rouge Pc on my network that been "bot 'ted" and is sending out spam, but is there and app / technic that will allow me to work out which device ?I have lock port 25 down on my...

View Article

Kaspersky causing lots of problems, even when disabled...

Hey all, hopefully someone can come up with a better solution than I have to my problem. We've just moved to Kaspersky Security Center 10 with Endpoint 10 and it's been doing some really strange...

View Article


DNS hijacking and you: Zombie computers, manipulation and covering your butt

This is the 293rd article in the Spotlight on IT series. If you'd be interested in writing an article on the subject of backup, security, storage, virtualization, mobile, networking, wireless, cloud...

View Article

Cisco asa 5505 8.2 port range forwarding

I have a cisco asa 5505 running software version 8.2 I do not have a smart net contract in order to upgrade the software. I need to forward a large range of ports to the internal voip server. What is...

View Article


Complaince with Gramm-Leach-Bliley-Act

I have been given the task of ensuring our systems meet the Gramm-Leach-Bliley-Act.I am reading up on it now.Can someone point me in the direction to find the IT needs?I need to come up with a plan and...

View Article

Image may be NSFW.
Clik here to view.

Blood in the Water: Bitcoin Woes Cause Attackers to Converge

Virtual greetings Spicecoin Miners...After toiling for a few years in obscurity, suddenly Bitcoin is everywhere...which makes it a huge target for the bad guys.Our man in Dublin, Sr Information...

View Article

WASP (Barcode Scanners)

Spiceheads,I have been diligently slapping bar coded asst tags on all of our equipment.Now it is time to actually "shoot" those bar codes into a database of some sort (yes, i know - i put the cart...

View Article
Browsing all 7477 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>