Quantcast
Channel: Spiceworks Community
Browsing all 7477 articles
Browse latest View live
↧

Security Flaws in UPNP

Apologies if this has been posted already... Looks like some major security flaws have been discovered in UPNP by Rapid 7. Edit: For those who can't be bothered reading the articles - they believe the...

View Article


Student classroom passwords

We are setting up a video editing classroom with iMacs, to teach video editing using Final Cut X and Adobe Premier. The instructor we've hired comes from the public school system, and has taught these...

View Article


Image may be NSFW.
Clik here to view.

Malwarebytes Enterprise Free Evaluation + T-Shirt!

Hi SpiceHeads, I wanted to let you in on an exclusive promotion for just for YOU! Submit your information here http://community.spiceworks.com/lg/malwarebytes_enterprise_eval and Malwarebytes will...

View Article

How to update BIOS on a full encrypted disk (Winmagic)?

Hi Guys, I have a clients laptop that has had full disk encrytion added a few months ago by some other IT guys from a place they deal With (Guardian) that required they have it. I was left out of this...

View Article

Has anyone heard if the report by Rapid7, on UPnP protocol is on the up and up?

Here's one link to a press release, from yesterday:https://community.rapid7.com/community/infosec/blog/2013/01/29/security-flaws-in-universal-plug-and-play-unplug-dont-play I am wondering if this is...

View Article


Chinese Hackers Infiltrate New York Times Computers

For the last four months, Chinese hackers have persistently attacked The New York Times, infiltrating its computer systems and getting passwords for its reporters and other employees. FTA, "To run...

View Article

Facility Security / Access Control

Hey guys, our building has 4 employee entrances and I am now in charge of security for it. Goal is for employees to enter the facility by either swiping a card or using a key fob with proximiy sensor...

View Article

Cracking a password

First let me say thanks for the help. I need to crack a co-worker's daughter's laptop password. She was unfortunately murdered a little over a week ago. He wants to try and use her laptop to put her...

View Article


Are Your Databases Audit-Ready?

http://www.darkreading.com/database-security/167901020/security/news/240147285/are-your-databases-audit-ready.html.htmlSome of the most common database compliance errors

View Article


Apple nukes Java (again)

http://www.slashgear.com/apple-says-no-to-java-7-blocks-browser-plug-in-31267667 I wasn't aware Apple had this power to be honest, but blocking future versions of the software and without notice or...

View Article

Have you read Cisco's 2013 Security Report?

Just released yesterday: http://www.cisco.com/en/US/prod/vpndevc/2013-annual-security-report.pdf Data point from Cisco report: "Java exploits comprised 87 percent of total web exploits. Additionally,...

View Article

Schneier: possible backdoor in IPMI, iDRAC, IMM@, iLO

I did not know this. Schneier on Security: The Eavesdropping System in Your Computer Dan Farmer has an interesting paper (long version here; short version here) discussing the Baseboard Management...

View Article

Random computers on the network

I am new here and I know the old IT person allowed personal equipment on the network, so I am trying to find a way to track down devices and see what they are. I have some machines showing up in DHCP...

View Article


Think someone is trying to Hack our network

Several times (20+ so far today) a day I get the following message from our Sonic Firewall: # Time Priority Category Message Source Destination Notes Rule 1 01/31/2013 13:57:29.096 Alert Intrusion...

View Article

Legacy Program Permissons

We are using a industry specialized software and I need help with the permissions. The program wants full access to its local client program files and full access to the server files as well (as per...

View Article


Virus:win32\Expiro.bc

SO, here's the issue. We have a campus with about 200 machines running Windows xp/7 mostly. Today we appear to have a new virus. I first found it in a network share and Microsoft Security Essentials...

View Article

Google Bids to Make Passwords Obsolete

Wired writes that Google has come up with a hardware-based authentication process that it thinks is both easy enough to use and powerful enough that people will actually adopt it. Hardware-based...

View Article


Do you use the same admin UN and PWD for different systems on small/medium LANs?

Hello, I would like to know what people do when working on small to medium LANs in regards to their admin UNs and PWDs. Do you use the same administrative un and pwd for everything? For (for example)...

View Article

ADFS in DMZ risks

Hi All, We are looking into migrating over to O365 with SSO. Are there any security risks I should consider with having an ADFS server in the DMZ for SSO? Cheers

View Article

Looking for a network access control system

I am looking to find a good network base access control system, where I can have cards, and pin codes in a few spots. Our facility is spread out over 450,000 sq ft, I will want the system to handle up...

View Article
Browsing all 7477 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>