Angry ex-employee still has email access: Have we been hacked?
This is the 38th article in the Spotlight on IT series. If you'd be interested in writing an article on the subject of backup, security, storage, virtualization or MSPs for the series PM Eric to get...
View ArticleFree Cheat Sheet on File Server Auditing
We've created a new Free Cheat Sheet for you guys. This time it is devoted to the File Server Auditing. This handy guide features: File Server auditing configuration checklist Event ID reference 4...
View ArticleAdvice needed - USB flash drives / data security
Hi all, Last week a Director of our business decided that the situation with regards to USB flash drives needs an urgent review. He asked me to audit all such devices currently in use, what files are...
View ArticleAre Your Email Addresses On A Russian Phishing Site?
We are finding many U.S. commercial email addresses at the Russian emailsworld-dot-boommer-dot-ru website. It is really a 'staging' area for emails to be posted by the criminal underground. They use...
View ArticleTrueCrypt system partition - inaccessible boot device
I have a system with 4 2TB drives set into 2 raid 1 volumes. 1 volume is the system drive and the other for data. Both volumes are encrypted. The system power was removed during heavy use and now the...
View ArticleGoDaddy SSL certificates - any good?
Hi all, I'm looking to replace a few self-signed certificates, and price-wise the GoDaddy certificates seem to be exceptionally good value. I've also checked the trusted root CAs on my Windows 7...
View Article448 Blowfish Encryption
Hey everyone; I just got a quote from a company for remote backup of my server, but i have some concerns about the use of 448 Blowfish encryption. Is this a strong encryption method?
View ArticleLaws concerning the installation of surveillance cameras in Texas
The company I work for is located just outside of Houston, Texas. I was wondering if you guys knew anything about what kinds of laws apply for installing surveillance cameras. One vendor I spoke with...
View ArticleSolarWinds Security Week
Welcome to IT Security Group Therapy! Is your network secure? Do you have the tools you need to be effective at your job? Don't panic, take a deep breath in... and breathe out. Doesn't that feel...
View ArticleIP security cameras
There was a company that always had adds on Spiceworks that sold HD IP security camera's. Anyone know the name of the company. As luck would have it, I have a need for a quote but I haven't seen the...
View ArticlePIV/Smartcard Question
My company has an application that allows DoD CAC and PIV card users to access their secure email or websites using a smart card. I have been tasked to replicate a PIV in house but I am running into a...
View ArticleTeamviewer Connection with out a password
I have a computer that was stolen from me, i had team viewer installed on it and its still on it, i dont have a set password so it changes around a lot, i know its still on because when i try and...
View ArticleSonicwall SSO can't see the loggedin user on WIN7 SP1
Hey guys, We use SOnicwall NSA2400, I also setup Sonicwall SSO (Single Sign On Agent) on two boxes. This is the error on the server that runs SSO Agent Failed to get Logged in User for IP:...
View ArticleMulti-Factor Authentication for 2 Users - What to Use?
We are looking at implementing multi-factor authentication for 2 users on our network for network login. I know many of the tehcnologies out there and the big players in the space, but what I am...
View ArticleKeylogger Progams??
Have a client who believes theirs a key logging program on the systems how do I find out if there is?? Thanks
View ArticleAmazon AWS - Integrated Authentication Systems
Does anyone have any experience in AWS Authentication. We have a setup already in place on EC2, its a combination of Linux and Windows servers. Mainly windows although we are hoping to be about 80%...
View ArticleWPA cracked in under a minute
Crap...http://tech.yahoo.com/blogs/null/147906EDIT: Just for everyone's info if you are using WPA2 you should be safe for now but for all of you using TKIP time to upgrade. Of course just last year I...
View ArticleBurp Suite
Anyone have any experience using Burp? I understand its probably the best on the market, I know big pen testers with the pod casts like paul dot com always speak highly of it but I would like to know...
View ArticleStock market email phishing with no hook.
Hello ChumsFor the past 5 months our organisation has been receiving strange stock market emails. Which is strange on several levels. Firstly we don't have any involvement with the stock market....
View ArticleBest Full Disk Encryption for Windows Laptops - AES 256 and Single Sign on
Hi there, I am currently on the lookout for a Full Disk Encryption product. We are currently using CheckPoint but it does not work well with AHCI mmode and causes BSOD. I am looking for an alternative...
View Article