Quantcast
Channel: Spiceworks Community
Browsing all 7477 articles
Browse latest View live

What is the easiest and most cost effective home surveillance system available?

What home surveillance system would you recommend that can be setup by a regular nontechnical person?

View Article


ZoneMinder Maintenance?

We currently use ZoneMinder for our UBNT cameras. Out of curiosity, does anyone know of any maintenance we would need to do with this software? Like deleting logs, defragmenting, etc. I can't seem to...

View Article


Looking for options for SSL VPN with 2 Factor Auth

Looking for suggestions on SSL VPN and 2 Factor Auth to deploy to approximately 400 users, with growth room. I don't particularly need anything fancy from the SSL VPN, really just the VPN connection...

View Article

Ways to remotely disable a company laptop?

Hey guys, this is the situation i'm in. We recently hired several new Oil rig safety technicians. We issued them laptops, so they can file their daily safety reports etc. One of the guys we hired was...

View Article

Q. re phishing attempt

Today one of my users got a classic phishing email: appeared to be from someone he knew, had text along the lines of, "Click here to get your file from Google Docs". The link, of course, was NOT to...

View Article


Security / Theft Deterent Mounting Screws For Server Racks

Does anyone know if they make security / theft deterent mounting screws for server racks Vs the standard type which you only need a standard phillips head screw driver for?

View Article

Email account hijacked and used to send phishing emails. Do I notify contacts?

Last week, an acquaintance had his e-mail hijacked and phishing emails were sent to many (all?) of his contacts, including me. Gmail alerted me with This message could be a scam. Before I could view a...

View Article

Warning: Your small business may have already been hacked

Here is a very fresh article at Yahoo Small Business that has a lot of ammo and good tips you should check...

View Article


Bruteforce Password Attacks

I am getting numerous login attempts against my SQL server every hour. My event logs are showing about 100 attempts an hour using the SA password. To counter this I have been blocking the IP's that...

View Article


Endpoint encryption and device control for both Windows and Mac environment

Hi! I am looking for a solution that can do endpoint encryption and device control. I currently have a mixed environment with Windows and Mac's. So far everything I am finding can support one or the...

View Article

What are the best names in hosted email service content filtering?

I work for a high school and until July 1st of this year we will be using a hosted service called Gaggle for our email needs (administration, staff, and students). Due to budget constraints, as well...

View Article

Snort alternatives?

I'm trying to revamp our network security and I'm looking at IPS/IDS, is there anything free (important consideration to help actually get my plan implemented...) that is easier to use/maintain and/or...

View Article

Why Your Password Can't be That Long - Why it should

So, early morning, digging around ars, and I read this headline:Why your password can’t have symbols—or be longer than 16 charactersEven a bank that limits passwords to eight characters defends...

View Article


should I allow podcast site to be accessible?

Hi there, Just need some advice here. We use linux's squidGuard as our web proxy so we can control what the users can/can't access.And some of them asked me if I can unblock a site: rrrfm.libsyn.com...

View Article

Draytek Vigor 2920n

Hello. Can anyone tell me how can i block torrent downloading from the menu of Vigor? thank y.

View Article


AutoCAD: Attach Digital Signatures

I'm looking at attaching digital signatures to AutoCAD drawings (and to PDFs hopefully), one of the municipalities to whom we submit drawings has started to require this. It's all new to me, I was...

View Article

Malware on Hotspot phone through connected device?

When using a phone in hotspot mode is it possible to get malware on the phone if a connected device went to a site and got infected?

View Article


Zoneminder

I am going with a Zoneminder security camera system and I have a few questions. First let me give all the details I have: 32 Cameras at least and need to be able to add more. Inside and outside. My...

View Article

Why McAfee won't change its name because of John McAfee

There's been a recurring topic of conversation in McAfee's executive meetings over the past month: John McAfee, the company's founder. John McAfee sold his security business in 1994 and has had...

View Article

Acceptable SSL Ciphers

Hello, We have recently obtained a vulnerability assessment and one of the duties I was responsible with was to make sure all our IIS and ISA servers are not presenting weak ciphers. I have gone in...

View Article
Browsing all 7477 articles
Browse latest View live