Quantcast
Channel: Spiceworks Community
Browsing all 7477 articles
Browse latest View live
↧

Who uses Roboform Everywhere for Work?

I love Roboform and use it to track everything and I have a Everywhere account that is my own. Just curious if anyone uses it to store work related passwords. I find myself on the go with an iPad etc...

View Article


Kaspersky klnagent 100% CPU usage

Ever since I did a deployment to ~30 computers the klnagent.exe has been using 100% CPU and shows no signs of stopping. I had to increase the vCPUs on the guest in order for it to operate properly (so...

View Article


Anyone know of a good article/document on password generation for users?

I am looking for a article/document on end user password generation for creating secure easy to remember passwords as well as tips for the end user that I can compile and present to our staff.

View Article

Six Real Security Threats IT Professionals May Face in 2013

Six Real Security Threats IT Professionals May Face in 2013: 1. Targeted espionage 2. Unintentional or accidental loss of that data 3. Denial of Service Attacks (DoS) 4. Understaffed IT team 5....

View Article

FISMA Certification....anyone?

We are unfortunately in the beginning stages of getting our FISMA Certification.....I got an email requesting that I find out what needs to be done, and how to achieve the certification. A quick...

View Article


How gone is gone?

After following this (http://community.spiceworks.com/topic/138965-disk-wipe-software-recommendations?page=3#entry-754879) thread, it sparked a thought. How secure/effective are these? I've personally...

View Article

Anyone has done before!! to config 2 factor with Cisco SSL VPN

As the subject,Please advise me. -Aye

View Article

Implementing security with linux

It's a real pleasure to be part of this community and would like to continue with the next case. Currently the corporation for which I work traditionally handled all the safety of navigation, using...

View Article


Wireshark is showing climbing port numbers on every site visited with browser

Some type of outgoing port scan, I have not been able to locate source, ie service producing. Currently, nuke and start over option not acceptable. Suggestions?? Attached screenshot of wireshark.

View Article


Rogue employee attempts to take company data hostage.

Interesting story that happened to me soon after I started the sysadmin role at our company. One of our employees was in charge of programming and overseeing the CNC machines. Over the years we had...

View Article

How to fire a sys admin: When IT pros go rogue

This is the 191st article in the Spotlight on IT series. If you'd be interested in writing an article on the subject of backup, security, storage, virtualization, mobile, networking, wireless, DNS, or...

View Article

Why do people become malicious hackers?

Tech republic had this interesting article http://www.techrepublic.com/blog/security/hackers-from-innocent-curiosity-to-illegal-activity/9453?tag=nl.e101&s_cid=e101&ttag=e101 While I wouldn't...

View Article

Need help choosing UTM and Switches

My father has a new office under construction at the moment. We plan to move in on the 13th. I'm responsible for taking care of his IT requirements. We are setting up a surveillance system comprising...

View Article


A nice easy report to show who has access to what

I'm hoping that someone here will be able to help me. I have been asked to produce a report that shows which users have access to folders on the network. Certainly to start with I would be looking at...

View Article

How do you determine if a cloud storage provider is safe?

Simple enough question you'd think :) You're looking for a cloud storage provider, whether it's for collaboration or for backups or whatever. You look at various vendors from small names to big names...

View Article


Please suggest Cheap and Best Data+Database+Email+Files on the Fly Encryption

Can anyone suggest Cheap and Best Data+Database+Email+Files on the Fly Encryption Software or solution. I am planning to implement the same with no or very little cost...Thanks in Advance...responses...

View Article

How do I use OpenSSL to convert a PEM cert to a PKCS12?

I have purchased my cert and it's .crt so that appears to be PEM format. I have found on the internet to convert it w/ openssl Convert PEM to PFX openssl pkcs12 -export -out certificate.pfx -inkey...

View Article


Office Personnel Panic Buttons

My office is looking at installing Panic buttons for some of our front-office employees. I have never researched options in this area and am just curious if anybody here has installed them? If so, any...

View Article

CompTIA CASP thoughts

Has anyone taken or thought about taking the CompTIA CASP (CompTIA Advanced Security Practitioner) exam? I was just wondering what your opinions are about it. I know it is supposed to follow the...

View Article

Shoretel security is a joke

Here is my conversation with our shoretel partner. Am I wrong to assume that this is a blatantly risky security practice. Does anyone else run shoretel for VoIP? Do you have your firewall disabled...

View Article
Browsing all 7477 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>