What is the easiest and most cost effective home surveillance system available?
What home surveillance system would you recommend that can be setup by a regular nontechnical person?
View ArticleZoneMinder Maintenance?
We currently use ZoneMinder for our UBNT cameras. Out of curiosity, does anyone know of any maintenance we would need to do with this software? Like deleting logs, defragmenting, etc. I can't seem to...
View ArticleLooking for options for SSL VPN with 2 Factor Auth
Looking for suggestions on SSL VPN and 2 Factor Auth to deploy to approximately 400 users, with growth room. I don't particularly need anything fancy from the SSL VPN, really just the VPN connection...
View ArticleWays to remotely disable a company laptop?
Hey guys, this is the situation i'm in. We recently hired several new Oil rig safety technicians. We issued them laptops, so they can file their daily safety reports etc. One of the guys we hired was...
View ArticleQ. re phishing attempt
Today one of my users got a classic phishing email: appeared to be from someone he knew, had text along the lines of, "Click here to get your file from Google Docs". The link, of course, was NOT to...
View ArticleSecurity / Theft Deterent Mounting Screws For Server Racks
Does anyone know if they make security / theft deterent mounting screws for server racks Vs the standard type which you only need a standard phillips head screw driver for?
View ArticleEmail account hijacked and used to send phishing emails. Do I notify contacts?
Last week, an acquaintance had his e-mail hijacked and phishing emails were sent to many (all?) of his contacts, including me. Gmail alerted me with This message could be a scam. Before I could view a...
View ArticleWarning: Your small business may have already been hacked
Here is a very fresh article at Yahoo Small Business that has a lot of ammo and good tips you should check...
View ArticleBruteforce Password Attacks
I am getting numerous login attempts against my SQL server every hour. My event logs are showing about 100 attempts an hour using the SA password. To counter this I have been blocking the IP's that...
View ArticleEndpoint encryption and device control for both Windows and Mac environment
Hi! I am looking for a solution that can do endpoint encryption and device control. I currently have a mixed environment with Windows and Mac's. So far everything I am finding can support one or the...
View ArticleWhat are the best names in hosted email service content filtering?
I work for a high school and until July 1st of this year we will be using a hosted service called Gaggle for our email needs (administration, staff, and students). Due to budget constraints, as well...
View ArticleSnort alternatives?
I'm trying to revamp our network security and I'm looking at IPS/IDS, is there anything free (important consideration to help actually get my plan implemented...) that is easier to use/maintain and/or...
View ArticleWhy Your Password Can't be That Long - Why it should
So, early morning, digging around ars, and I read this headline:Why your password can’t have symbols—or be longer than 16 charactersEven a bank that limits passwords to eight characters defends...
View Articleshould I allow podcast site to be accessible?
Hi there, Just need some advice here. We use linux's squidGuard as our web proxy so we can control what the users can/can't access.And some of them asked me if I can unblock a site: rrrfm.libsyn.com...
View ArticleDraytek Vigor 2920n
Hello. Can anyone tell me how can i block torrent downloading from the menu of Vigor? thank y.
View ArticleAutoCAD: Attach Digital Signatures
I'm looking at attaching digital signatures to AutoCAD drawings (and to PDFs hopefully), one of the municipalities to whom we submit drawings has started to require this. It's all new to me, I was...
View ArticleMalware on Hotspot phone through connected device?
When using a phone in hotspot mode is it possible to get malware on the phone if a connected device went to a site and got infected?
View ArticleZoneminder
I am going with a Zoneminder security camera system and I have a few questions. First let me give all the details I have: 32 Cameras at least and need to be able to add more. Inside and outside. My...
View ArticleWhy McAfee won't change its name because of John McAfee
There's been a recurring topic of conversation in McAfee's executive meetings over the past month: John McAfee, the company's founder. John McAfee sold his security business in 1994 and has had...
View ArticleAcceptable SSL Ciphers
Hello, We have recently obtained a vulnerability assessment and one of the duties I was responsible with was to make sure all our IIS and ISA servers are not presenting weak ciphers. I have gone in...
View Article