Quantcast
Channel: Spiceworks Community
Browsing all 7477 articles
Browse latest View live

Private eyes are watching you: Monitoring a fire

This is the 172nd article in the Spotlight on IT series. If you'd be interested in writing an article on the subject of backup, security, storage, virtualization, mobile, networking, wireless, DNS, or...

View Article


IP Surveillance/PoE question

How do you deal with undetected loops and traffic flow disruptions? Would love to hear your thoughts. We just conducted some research and produced a paper on this topic (among other issues). Your...

View Article


Avast Boot Scan stuck - black screen

I installed Avast on an HP Laptop, ran the scan and it found a few things and suggested I run the boot time scan and restart. I did but now it reboots to a black screen and nothing shows as if were...

View Article

Does Google docs meet HIPAA standards and other security regulations?

Does Google docs meet HIPAA standards and other security regulations for a health care organization? Please feel free to make recommendations as to other file storing, easy access and sharing service...

View Article

Image may be NSFW.
Clik here to view.

Connecting the Interwebs: Q&A with OpenDNS

We recently had the chance to chat with Dan Hubbard, CTO of OpenDNS, which just happens to be the world's largest provider of DNS and cloud-based Internet security. He gave us a glimpse into what goes...

View Article


Veracode survey claims 1/3 of web applications suffer from SQL vulnerability

It is not quite a coin toss but maybe Rock Paper Scissors.http://www.net-security.org/secworld.php?id=14713

View Article

What are you using to encrypt GUID partitions?

So up to now, I've been encrypting all our laptops with TrueCrypt. Yesterday I received a new laptop that has a GUID partition table, which as you know is not a new technology. However, TrueCrypt only...

View Article

Outlook conversations edited?

Is it possible for someone to edit a conversation in the conversation history folder in Outlook? We have some not so funny stuff happening and I'm trying to get to the bottom of it.

View Article


Desktop Monitoring Software

Hey guys I've been given the task to help a local Charity out, they have a single simple system connected to broadband and suspect the user is looking at unfavourable websites. In terms of...

View Article


Anyone familiar with icalcs?

Server A currently holds user data at e:\data\felles Server A is also a Domain Controller, I am looking to move Server A data to Server B and then copy the current security and groups but replacing...

View Article

Hippa compliance of a exchange service & EMR services on the same system.

I have recently started to administrate a doctors server. I am in the process of making sure everything is HIPPA compliant. They have a server that has exchange and there EMR software on the same...

View Article

Two Factor Authentication for RDP

Looking for some suggestions to use for Two Factor Authentication to a Windows 2008 Server for RDP sessions. Local gov agency so needs to be low budget if possible. Also prefer not to have a separate...

View Article

Vudu.com offices had a break-in

Criminals stole equipment including hard drives with personal information. See more:http://www.vudu.com/password_faq.html

View Article


hippa security requirements

new into healthcare industry. where can i find information about hipaa and its security requirements while handling hosting and storing data etc. what kind of hardware and software requirements i...

View Article

Attending ISC West this week in Las Vegas?

WD will be exhibiting and we invite you to come by to see live demos and daily raffles. Visit us at booth#2127.

View Article


Healthcare Providers: What are the rules about sending emails with PHI?

All my HIPAA research has turned up vague results. Does anyone know whether or not you can send a regular email with health information in it, as long as it has a confidentiality notice on the bottom?...

View Article

Retailers Attacked by POS Malware

Can anyone add more to this article? http://www.bankinfosecurity.com/retailers-attacked-by-pos-malware-a-5670 Such as: What was the remote access software? Was the software comprised or did the...

View Article


Steganography goes Social

http://www.wired.com/dangerroom/2013/04/secretbook/ [quote]Facebook is a place where you can share pictures of cute animals and fun activities. Now there’s a browser extension that lets you encode...

View Article

To allow or not to allow LogMeIn and GotoMyPC

I would like for other pros to weigh in on what their company’s policy is on connections offsite hosts through technologies such as LogMeIn and GotoMyPC. I realize that they are great tools to enhance...

View Article

NEW. KnowBe4 Launches Kevin Mitnick Home Internet Security Course

We have some very exciting news for you. When you receive an email from a friend or relative saying they are in trouble and desperate for your help, most likely you would open the email. This is just...

View Article
Browsing all 7477 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>