Quantcast
Channel: Spiceworks Community
Browsing all 7477 articles
Browse latest View live
↧

Internet Explorer has stopped working

I continuously get this several times a day on my computer "Internet explorer has stopped working." I downloaded a "fix-it" website (not the correct name), they not only charged me $150.00 but I...

View Article


Decommissioning old equipment

How do Spiceheads decom their old gear? Workstations, desktops, laptops, servers, etc... Do you have a policy or spec to meet? How do you handle things like phones and tablets? I'm interested to see...

View Article


AV Scan at high noon..

The company I work for set the virus scan to run at noon everyday on Monday. Recently many people have been experiencing Outlook crashing, and there computers performing slowly. I have pointed this...

View Article

Ideas on in-house email filtering appliance

Hi All, I just wanted to get some thoughts on a solution for an in-house email security appliance. Right now we are using a hosted service that is provided by our consultants. It is a Barracuda email...

View Article

Does it matter security wise if you turn off public firewall in Windows 7

I have been turning off all firewall settings in Windows 7 computers within our network (of course, we have a network firewall). I'm wondering if I should keep the computer firewall on for Public...

View Article


Threat Number One: Spear Phishing

Threat Number One: Spear Phishing A whopping 91% of cyberattacks and the resulting data breach begin with a "spear phishing" email, according to recent research from security software firm Trend...

View Article

Print from outside the firewall

I have an FTP server sitting outside my firewall. We had a working rule which allowed printing from this box, through the firewall, to a printer on our LAN. I just changed the destination ip address...

View Article

Personal (confidential) info on a computer, Liability issues?

Hi folks, I have a user that has placed 95 gigs of confidential (including scans of driver license and SS#, tax info, refinance info, etc) data on their computer. This data is strictly personal and...

View Article


Good IP Camera Solution

My new management is looking at expanding the number of IP security cameras we have here from 6 to about 12. Currently, we use Heivision cameras, which appear to be no-name and use software that is...

View Article


Help Am I lost?

I am a graduate student in computing, attempting to complete a project I Intrusion Detection Systems. I thought I had struck gold when I found your site but on closer examination it seems more...

View Article

GFI Languard 2012 - the most craptacular piece of s...ecurity software?

Hello, Any GFI Languard users out there? Just wondering is it me or is Languard 2012 the worst piece of software I have come upon on recent years. I have previously used the Languard 9.6 and it was a...

View Article

Dell Networking webinar #3 will focus on Security! Join us on March 27th!

Join Dell Networking webinar #3 that will focus on security and how to build a resilient Network! You will be able to chat live with one of our Enterprise Technologists.Visit our page and register...

View Article

Make PDF "copy protected" to avoid duplication?

OK, so I know this may sound like a somewhat unusual question. I also know that "trying to keep bits from being copied is like trying to keep water from getting wet". But we have a request here at...

View Article


Economics of Security and Managed Services

You are cordially invited to join AVG Technologies for a no cost webinar on the Economics of Security and Managed Services. Click here to register. Tuesday, March 12, 2013 2:00 pm Eastern Daylight...

View Article

ISO 2007-1 certification

Hello Everyone, Have a client in the seacoast NH area that does a lot of market research and analysis for some pretty big names. Recently went through a full and painful audit process with them and...

View Article


Data retention requirements in UK - who is responsible ?

I think I know the answer but not having any legal training nor the ability to decipher much of the legal mumbo jumbo out there I'd thought I'd pose this question. A student accommodation block has...

View Article

create a referential security policy for small and average entreprise

hi am Houssem, Am working in a project for ANSI (National agency for Security of Information ) and am looking for standrise the concept and the IT security architecture and the deploiment inside small...

View Article


Need recommendations for a camera-based monitoring solution

The Setup A client of mine will soon begin conducting a long-term product test of some of their new products. Its rather unprecedented within their industry and involves fire. Lots of it. Over several...

View Article

FileAudit 4 has been rated "Excellent" in PC Mag ...:-)

Samara Lynn, Lead Analyst at PC Mag, just performed an in-depth review of FileAudit 4 and rated our software solution "EXCELLENT" ... If you intend to proactively track, audit, report and alert on all...

View Article

Java 6 End of Updates

With Java 6 publicly available updated now ended, and the seeming constant deluge of zero-days lately, will you be removing 6 from you environment and going to 7? I've seen some applications that run...

View Article
Browsing all 7477 articles
Browse latest View live