Where do you read about your daily IT Security news?
Hi everybody, I would like to find out which are your first choices when it comes to IT security / Data Loss Prevention online magazines / blogs. Thanks in advance for your answers.
View ArticleLocked hinged access door on wall?
We have a large 70" TV build into the wall and our only access to it is on the backside of the wall we have a small hole cut that is about 18 inches square. This is going to be in a public area so...
View ArticleAdministrative password best practice?
Opinions on best practice for local and domain administrative password resets? How often should they be changed? Never, yearly, only when an administrator leaves employment?
View ArticleOSSEC blocks me after I logoff
So we've been installing and setting up ossec on our linux systems with no problem. ran into a funny issue on one linux system: I have installed ossec clean and configured the server address. start...
View ArticleBest source for learning Penetration Testing
Hello everyone, I wanted to pick your brains about Penetration Testing. I have a real itch to pursue this part of the security field but I'm not sure where to start getting some practical experience....
View ArticleMikrotik Router SSH pre-authentication vulnerability
I just read this in my SANS @Risk email and know how popular these products are with some spiceheads so I thought I'd share: Well-known security researcher "kingcope" posted an announcement this week...
View ArticleWhy so many Sessions on port 53? Untangle Terminal server and exchange.
Hey guys, Here is the deal I just a report form my Untangle box, and it's claiming over 370,000 Sessions on port 53 (DNS right?). but nothing else is even close to that count. 2nd 24,000 Port 443. 3rd...
View ArticleScam Of The Week: "U.S. Starts Bombing Syria"
This one is crafty. There is a fake CNN spam being sent with a subject that reads: "The United States began bombing!" in Syria, but clicking on it will likely result in the workstation being infected...
View Articleputer security tips
from here: http://www.theguardian.com/world/2013/sep/05/nsa-how-to-remain-secure-surveillance 1) Hide in the network. Implement hidden services. Use Tor to anonymize yourself. Yes, the NSA targets Tor...
View ArticleKaspersky causing lots of problems, even when disabled...
Hey all, hopefully someone can come up with a better solution than I have to my problem. We've just moved to Kaspersky Security Center 10 with Endpoint 10 and it's been doing some really strange...
View ArticleKaspersky Security for Virtualization - SVMs
I am in the process of installing and configuring Kaspersky Security for our VMWare environment and am having a hard time finding any information on the SVM images. Does anyone have any experience...
View ArticleLooking for some advice on control access solutions
Hello Everyone, The company I consult for is currently in the market for some access control solutions. So far I have researched the solution Centrify has in place. I would like the input from some of...
View ArticleSelf Service Password Reset
We should be implementing Softerra's Adaxes over the coming weeks and months. One of the things it does is self service password reset, which with 500 or so users seems like it will have its place. It...
View Articleserver hardening policy
I work for a credit union and our examiner is wanting me to write a server hardening policy. I was wondering if anybody out there might be willing to share their policy to help me from reinventing the...
View Articleanyone know of a good free program that will play zoom and capture dav files
anyone know of a good free program that will play zoom and capture dav files these are security videos from a network dvr with linux software..
View ArticleWindows SteadyState Internet Lockdown question
Maybe someone here can help me with this. I've set up everything for a kiosk sort of setup without issue except one, I have set it up to allow only two sites to be accessed. Our main website works no...
View ArticleRemove local admin without breaking everything
We really need to remove our users from being local admins. I'm not entirely sure what will break, but I do know a few things. I was just wondering if you all had any suggestions on how to do this...
View ArticleOffline Two Factor Auth on Mac OS X at login.
I have been tasked with finding a two factor authentication system not just for VPN, but for user systems as well. While this would be all fine and dandy if we just ran Win7, we also have Linux...
View ArticleWebmail - opinions sought.
Well, one of our users did the unforgivable today and tried to email corporate data out of the network to a third party. We picked this up, no problems and he now has his own problem - unemployment....
View ArticleCached Credentials Logon and Last loged-on username visable
How many of my fellow IT Pro's disable these two options on your networks, I am running languard and they are giving me a warning that they are active. I had read through responses for the Admin...
View Article