Quantcast
Channel: Spiceworks Community
Browsing all 7477 articles
Browse latest View live
↧

Video Monitoring Systems

I am currently looking into replacing our VMS, hardware and software. We already have our cameras - currently 40 and all IP - and will probably be close to 60 in the next three years. Ideally the...

View Article


How secure is LastPass password manager?

I have seriously been considering using a password manager. I have been looking at KeePass and LastPass, with the latter being cloud-based. The cloud-based part sounds both convenient and scary....

View Article


Proving OS was intentionally damaged

I've got a laptop that came in over the weekend with very odd symptoms. The user has been complaining about her PC since the day it was issued. We replaced it with a newer model and upgraded it and...

View Article

Security - who do you think is responsible?

With the influx of mobile devices in the workplace, IT security is a hot topic that shouldn’t be overlooked. Many times, companies focus security efforts on protecting confidential electronic data on...

View Article

Does anyone has experience with Cyberoam security appliances?

I am considering changing our current firewall and web security & email security appliance and Cyberoam was one interesting "All-in-one" device as i checked it.. I saw some older reviews on this...

View Article


Java Security Updates

We have the latest Java on all the workstations, which is 7 update 25. I hate having java on PCs for security reasons but we have to have it for software we use. I would like to know when the next...

View Article

Unbranded DVR H.264/16 channel

I was wondering if I can change the Software installed on my DVR, There is one on there now but it does not meet our needs, we have a fancy system (motion tracking and smart recording), but its old...

View Article

Confused Xerox copiers rewrite documents

I got this today in another group I am inConfused Xerox copiers rewrite documents In tests, it was found that often the number "6" would be turned into an "8", and vice versa, with other numbers being...

View Article


Troubleshooting Kaspersky Endpoint Security 10

As is typical with any program that touches everything in a system, sometimes (all the time!) the finger gets pointed at the AV subsystem. Since migrating to Kaspersky, our detection rate has been...

View Article


Monitoring users internet activity

I have a customer that wants to be able to get reports on users internet activity on their individual PC's. i.e. they want to see that their employee Jane went to website xyz.com at 9:30am and was...

View Article

Finding Geographical IP Addresses

We want to be able to block other countries IPs within our web gateway. We can add ranges to do this, but how can I get a list of a countries ip address range? Where I work this is no need for a user...

View Article

I am Looking for cyber security consultant for a large firm with 5000 seats

I have a great customer of mine that is looking for someone to hire for some consulting work in the Cyber Security field. They have 5000 active seats right now. Must have experience with this size of...

View Article

Monitor google talk chats

Hello, I have a client that needs the ability to monitor google talk chats. They have recently had an employee who they believe is leaking vital firm information to an ex-employee. They also requested...

View Article


I cant convert a SSL crt to PFX! I need HELP with this @#%!(@$*!!!!!

Please I need some help. Customer has purchased an SSL cert via Network Solutions and I need to convert the crt file to pfx so it can be imported onto the remote desktop services server. I have tried...

View Article

PC compliance - Checkpoint 3D

Hey guys, I was wondering weather there are other software/open source programs that can generate a compliance report on PCs and laptops like the checkpoint 3D?

View Article


If you could hack into any system, what would it be?

Hey Spiceheads! If you could hack into any system on the planet, what would it be?

View Article

People will hack anything

I saw this and couldn't believe it. You just can't be too careful no matter where you go.(pun intended)

View Article


Needing to record vendor activities on my ubuntu servers. psacct or alternative

Hi AllI have a 3rd party vendor who does remote software maintenance on my ERP system. We are very concerned that a junior tech on their side takes a copy of our database for a "rainy day"Currently, I...

View Article

Drive Level Encryption

Hello everyone, I'm looking into products to provide drive level encryption and my research has led my to two items (though I'm certainly open to suggestions)- BitLocker and TrueCrypt. It doesn't...

View Article

Information Security Officer vs Information Security Analyst

What are the main differences between Information Security Officer and Information Security Analyst ? Are there any ???

View Article
Browsing all 7477 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>