"Leading" heathcare company doesn't know how to host email
One of my clients went with a "leading" healthcare IT company (big company, many divisions, in a different state)to provide website and email services, of course without asking my opinion first -I...
View ArticleHow Cryptolocker cost me 2 files...
I wish I could say that I only lost 2 files because I was so on top of things with backups and all the stuff that goes along with having the perfect IT environment. However, that is the farthest thing...
View ArticleDVR Software for 10+ IP Cameras
We've got a new location coming online and the manager wants to have security cameras set up to record on a DVR for up to 30 days. Has anyone used any kind of DVR server software or appliance that...
View ArticleBlacklisted in the government's crackdown on p2pzeus!
We are using a Sonicwall E5500 firewall with all security services turned on, along with the McAfee antivirus enforced client. We are also using a Sonicwall anti-spam appliance (VMware). Many of our...
View ArticleAny Free software to turn WebCam into Security Camera?
Anyone know of any good free software that would turn a webcam into a security camera? So I can record video when a motion is detected?
View ArticleTruecrypt is dead?
Spotted on /r/sysadminhttp://truecrypt.sourceforge.net/I didn't realise this was happening?
View ArticleWe fought a cryptovirus (and the virus won)
This is the 315th article in the Spotlight on IT series. If you'd be interested in writing an article on the subject of backup, security, storage, virtualization, mobile, networking, wireless, cloud...
View ArticleRidiculous places users store passwords?
Hey there Spiceheads! The creative team at Spiceworks Studios is making a fun commercial for our friends over at Ping Identity and we need your help! The topic? Crazy (some would say stupid) places...
View ArticleEncrypting emails before they reach exchange.
I am wondering what would be a good solution to encrypt a departments before the emails reach exchange, endpoint encryption or point to point encryption. What do you all use and why? Aside from O365....
View ArticleWebShell and latest Verison Netcat
For Penetration Testing of webserver I need php webshell with netcat option and also need latest version of netcat... google fail to find:
View ArticleP.F. Changs Credit Card Breach
It looks like P.F. Changs is the latest to be affected by a credit card breach. On June 9, thousands of newly-stolen credit and debit cards went up for sale on rescator.so, the same underground store...
View ArticleCameras switching from NTSC to PAL and back randomly
We have 2 TruVision TVN20's and ~20 Interlogix IP Dome cameras - UVD-IP-EVRDNR-VA2's (not the -P versions). Plus 2 bullet cameras - GES TVC-M1245E-2M-NThe cameras are set to record continuously 6am-9pm...
View Article"Renewal Notice" Scam
I received this "Renewal Notice" from a company called National Telecompany, Inc. based out of Pasadena, California. My AP dept had received it, stamped it for coding and put in my mailbox to get my...
View ArticleSoftware to remove metadata from outgoing attachments
I am looking for Software that will prompt the user and scrub confidential data from attachments.We often send documents to lawyers etc and need to sanitized copies that do not contain confidential...
View ArticleForgotten Password
Hello, Can someone please tell me how can I override a voice mail's forgotten password to set up new one on a Panasonic KX-TVA50.
View ArticleGFI Languard 2012 - the most craptacular piece of s...ecurity software?
Hello, Any GFI Languard users out there? Just wondering is it me or is Languard 2012 the worst piece of software I have come upon on recent years. I have previously used the Languard 9.6 and it was a...
View ArticleBest Free Anti-Spyware Software
Simple question here: In your opinion, what is the best free anti-spyware software?
View ArticleEndpoint Security - Strategy and One Product To Rule Them All?
I'm looking at where we go with endpoint security.Like most organisations we have laptops desktops and mobiles.Then in terms of technologies we have signatures, cloud, sandboxing, whitelisting,...
View ArticleInternal IT Infrastructure - Security
Hey Spiceheads, I'm in need of your professional opinions. what are some of the biggest Internal security flaws/risks most commonly found in IT infrastructures today?
View ArticleDVR Remote Access - working from most locations - one can't log on
Hi Everyone - We use CNB DVR's and their remote viewing program Nemon2.Three users can successfully access the Shop DVR through the current set up .User #4 - who really needs it the most - cannot...
View Article