Quantcast
Channel: Spiceworks Community
Browsing all 7477 articles
Browse latest View live

World Cup Security Team Accidentally Shares Its Awful Wi-Fi Password

Saw this earlier and thought I'd share here. What's the bigger security crime: having your Wi-Fi password displayed on a big screen, or using tired old internet speak to have "b5a2112014" as the...

View Article


Server room door open....bad feeling

Found my server room door open.  "for the past few hours, we thought you were cooling us off"No one saw who did it and no one knows exactly when it happened.  Only that it was a few hours ago.What...

View Article


Captured my own password...

I was just going from day shift to graveyard (still have the file saved too :) ) and I noticed on a site I was using to study for certifications, paid through the agency I am going through mind you,...

View Article

Image may be NSFW.
Clik here to view.

Real-time map of hacks around the world

Well, I think I'm going to trash my electronic devices, retreat to the woods and lead that nomadic lifestyle I've always dreamed of.The security firm Norse created thisreal time mapof hacks in progress...

View Article

Hi guys i have ssh server under linux machine, i need to monitor ssh session

Hi guys i have ssh server under linux machine connected to other machines, i need to monitor ssh sessions , or "logging ssh sessions"  any one have any idea about this please.

View Article


Imprivata OneSign vs. 2FA - Experiences?

Hello guys and gals. At my org I have a project getting going to set up Citrix XenApp/XenDesktop in our environment (Healthcare org) and we have a lot of mobile staff that need to access their work...

View Article

How do you guys restrict flash drives/external hard drives?

We're looking for a way to restrict all flash drives and external drives on our network to just our approved drives. We need to ban all personal drives from being plugged into our desktops on our...

View Article

software to see what shares are open, and who is logged on

Hi,I'm doing a lot of work, implementing ACL's on shares that were previously untouched. :)one thing i'm looking for, is a piece of software to tell me if the share that i'm currently setting up the...

View Article


Cryptowall - Block these IP networks and domains now!

Hi Spiceheads,Please see update below from our security provider in the US with actions to be taken to reduce chances of being infected.19 UPDATE: CIS received information from a trusted third party...

View Article


Security Audit

I was approached by our internal audit committee and they are wanting me to perform and IT audit. This can be performed by a 3rd party or a member of my staff. Any ideas or recommendations? 

View Article

Cloud Managed Full Disk Encryption option?

Ok, part of my next projects is to strengthen our laptop and external drive encryption tools.We at the moment use Truecrypt for the Windows 7 systems and Bitlocker for the Windows 8Both are nice and...

View Article

Multiple Alienvault warnings a day from our DC

I'm getting concerned here. It used to be only 1 or 2 a week, but I've seen 3 alerts just today already! They are the "DC has been communicating with suspicious IP..." warnings. Our ISP manages our...

View Article

Image may be NSFW.
Clik here to view.

The USB Condom: A must have? Or just plain odd!

A common offering at conference these days is a way to charge your smart phone using USB. However, there is a danger ofjuice jacking - a way for hackers to access data on your device through USB. The...

View Article


PWM- opensource password reset

http://code.google.com/p/pwm Anyone played with this yet? Looks pretty cool.

View Article

URL filtering for mobile users?

Kind of as subject I guess.We have some really good protection (fingers crossed) for anyone behind our perimeter but when people are offsite there's a massive dependence on the endpoint product.What...

View Article


Is PC Bloatware a security risk or just a Nuisance?

What Up Fellow Spiceheads.In your opinion (or experience) is Bloatware -  that comes pre-installed on PCs simply just a nuisance and resource hog, or is there proof that it can cause actual security...

View Article

Publishing certificates to inspect SSL connections and browser trusted root cert

Hi All, I am not very knowledgeable in certificates so any help or advice much appreciated. We are using a fortigate firewall and would like to use SSL inspection where the firewall intercepts SSL...

View Article


Kaspersky Endpoint Security 10 reports wrong information

KES10; Server 2008R2. KES10 sends reports that contain incorrect information. This time it was claimed that two PCs had AV protection off. After checking KES Center console, both computers show in...

View Article

Snort

I installed snort, and acid. Snort is working but not reporting anything in acid. Acid says there are 0 sensors. If you look in mysql server the sensor table is empty. I am using Ubuntu. How do I fix...

View Article

detect keylogger installed

I was running a scan of s&d antispyware on one desktop and caught a glimpse on the scan- perfect keylogger. Just came up to my mind, in general, what are your ways of detecting if a machine has a...

View Article
Browsing all 7477 articles
Browse latest View live