ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login
    1. Topics
    2. Tags
    3. security
    Log in to post
    • All categories
    • wrx7mW

      Website Localization Testing - E-commerce Manager Requesting 3rd-Party VPN/Proxy

      Watching Ignoring Scheduled Pinned Locked Moved IT Discussion website localization vpn proxy security
      7
      1 Votes
      7 Posts
      2k Views
      wrx7mW

      @ambarishrh Thanks. I just sent him that link to check it out.

    • scottalanmillerS

      What Exactly Is a VPN, Is HTTPS a VPN SAMIT Video

      Watching Ignoring Scheduled Pinned Locked Moved IT Discussion samit security networking vpn https ssl tunneling encryption youtube scott alan miller
      28
      4 Votes
      28 Posts
      5k Views
      scottalanmillerS

      @zubairkhanzhk you're welcome!

    • mlnewsM

      Stingrays Allow Government to Hijack Your Cell Phone Communications

      Watching Ignoring Scheduled Pinned Locked Moved News stingray mobile telephony ars technica security texting
      3
      0 Votes
      3 Posts
      926 Views
      StrongBadS

      Maybe for the best, need to teach people not to trust their phones.

    • mlnewsM

      Log Into Windows with a Biometric Ring

      Watching Ignoring Scheduled Pinned Locked Moved News windows security biometrics softpedia
      7
      2 Votes
      7 Posts
      2k Views
      scottalanmillerS

      @Tim_G said in Log Into Windows with a Biometric Ring:

      @Dashrender said in Log Into Windows with a Biometric Ring:

      So now you start stealing rings... lol

      It's harder to steal a ring than credentials through phishing emails, as one example.

      Quite a bit more 🙂 And easier to know when it has been stolen.

      Now if the ring could read heart or other biometric and only work when on the right person's finger(s), even better.

    • mlnewsM

      Windows Users Location Identified in Seconds

      Watching Ignoring Scheduled Pinned Locked Moved News wikileaks windows security location services
      1
      3 Votes
      1 Posts
      672 Views
      No one has replied
    • mlnewsM

      NotPetya Might Have Not Have Been an NSA Leak

      Watching Ignoring Scheduled Pinned Locked Moved News nsa malware security
      6
      0 Votes
      6 Posts
      1k Views
      stusS

      After monitoring this new outbreak for 24 hours, I came to the conclusion we were dealing with cyber warfare, and not ransomware. Two separate reports coming from Comae Technologies and Kaspersky Lab experts confirm this now.

      NotPetya is a destructive disk wiper similar to Shamoon which has been targeting Saudi Arabia in the recent past. Note that Shamoon actually deleted files, NotPetya goes about it slightly different, it does not delete any data but simply makes it unusable by locking the files and then throwing away the key. The end result is the same.

      Someone is hijacking known ransomware families and using them to attack Ukrainian computer systems. Guess who.

      You never had a chance to recover your files. There are several technical indicators that NotPetya was only made to look as ransomware as a smoke screen:

      It never bothers to generate a valid infection ID The Master File Table gets overwritten and is not recoverable The author of the original Petya also made it clear NotPetya was not his work

      This has actually happened earlier. Foreshadowing the NotPetya attack, the author of the AES-NI ransomware said in May he did not create the XData ransomware, which was also used in targeted attacks against Ukraine. Furthermore, both XData and NotPetya used the same distribution vector, the update servers of a Ukrainian accounting software maker.

      Catalin Cimpanu, the Security News Editor for Bleepingcomputer stated: "The consensus on NotPetya has shifted dramatically in the past 24 hours, and nobody would be wrong to say that NotPetya is on the same level with Stuxnet and BlackEnergy, two malware families used for political purposes and for their destructive effects. Evidence is clearly mounting that NotPetya is a cyber-weapon and not just some overly-aggressive ransomware."

      Cybersecurity has moved from tech to a CEO and Board-level business issue

      You did not sign up for this, but today it is abundantly clear that as an IT pro you are have just found yourself on the front line of 21-st century cyber war. Cybersecurity has moved from tech to a CEO and Board-level business issue. I strongly suggest you have another look at your defense-in-depth, and make sure to:

      Have weapons-grade backups
      Religiously patch
      Step users through new-school security awareness training.

    • gjacobseG

      AD User Tool: Bulk AD User

      Watching Ignoring Scheduled Pinned Locked Moved IT Discussion server 2012 r2 security ad active directory domain domain active directory password reset password
      15
      1 Votes
      15 Posts
      4k Views
      DashrenderD

      @dbeato said in AD User Tool: Bulk AD User:

      @Dashrender Then, he needs to force it with Powershell no just a GUI....

      Agreed.

    • gjacobseG

      Nextcloud: seeding company 400GBs

      Watching Ignoring Scheduled Pinned Locked Moved IT Discussion nextcloud 12 shares filesystems file sharing security
      5
      1 Votes
      5 Posts
      1k Views
      JaredBuschJ

      New build? Create the "admin" account that will "own" the share.
      Then use rsync to upload everything.
      Then use the occ command to rescan the directory.

    • scottalanmillerS

      Comparing Fax and Email Security

      Watching Ignoring Scheduled Pinned Locked Moved IT Discussion fax hipaa security email smtp
      24
      2 Votes
      24 Posts
      4k Views
      scottalanmillerS

      @BRRABill said in Comparing Fax and Email Security:

      @scottalanmiller said in Comparing Fax and Email Security:

      @BRRABill said in Comparing Fax and Email Security:

      P.S. Are you getting paid by some strange company to use the word "corruption" this week?

      Calling it as it is. The world is a very corrupt place and most of it happens because society conditions us to feel like it is acceptable.

      And there it is ... AGAIN! 🙂

      Society hasn't changed, it's just how it is.

    • stusS

      [ALERT] Looks Like A New Worldwide Ransomware Outbreak

      Watching Ignoring Scheduled Pinned Locked Moved IT Discussion security malware ransomware knowbe4 knowbe4 blog windows patching zero day
      2
      3 Votes
      2 Posts
      1k Views
      DanpD

      @stus Thanks. Was just reading about it here.

    • gjacobseG

      Temporary Profile in RDS session

      Watching Ignoring Scheduled Pinned Locked Moved IT Discussion security profiles rds remote desktops thin client
      9
      1 Votes
      9 Posts
      9k Views
      gjacobseG

      Rebooted - profile created.

    • EddieJenningsE

      SSH and FreePBX

      Watching Ignoring Scheduled Pinned Locked Moved IT Discussion freepbx 13 ssh security sudo cli
      10
      0 Votes
      10 Posts
      7k Views
      JaredBuschJ

      And easy enough to resolve once I look.

      @EddieJennings you should have reminded me to look more earlier..

      /etc/sudoers has it commented out.

      ## Allows people in group wheel to run all commands # %wheel ALL=(ALL) ALL ## Same thing without a password # %wheel ALL=(ALL) NOPASSWD: ALL
    • bjB

      Firewalls, the good, the bad, and the ugly.

      Watching Ignoring Scheduled Pinned Locked Moved IT Discussion firewall pfsense asa sonicwall palo alto security ubnt ubiquiti
      66
      0 Votes
      66 Posts
      10k Views
      bigbearB

      Just wanted to add @bj to this thread that I think a $100-ish Cloud Router from Mikrotik would blow most hardware away, including Ubiquiti, on pure performance. With the $50 and under models you are still getting 1 million PPS. The new cloud router series really has a crazy amount of power.

      This still coming from a pure PPS (packets per second) point of view.

      I think the cheapest cloud router has 12 to 16 cores That would only count for the core routers I am more familiar with (12 to 24 now) in the $500 range.

      Very poor marketing in the states but very popular with western country WISPS.

    • EddieJenningsE

      Call Traffic Mystery

      Watching Ignoring Scheduled Pinned Locked Moved IT Discussion voip phone call routing security
      9
      1 Votes
      9 Posts
      2k Views
      EddieJenningsE

      I think I understand the basic process of the scammer.

      They call us toll-free. During that toll-free call, they use the compromised extension to make a long-distance call.

    • gjacobseG

      non VPN Cloud based storage

      Watching Ignoring Scheduled Pinned Locked Moved IT Discussion dropbox nextcloud open source pdf sharepoint cloud storage photos security owncloud box.net
      29
      0 Votes
      29 Posts
      6k Views
      DashrenderD

      @scottalanmiller said in non VPN Cloud based storage:

      @Dashrender said in non VPN Cloud based storage:

      @scottalanmiller said in non VPN Cloud based storage:

      @Dashrender said in non VPN Cloud based storage:

      @scottalanmiller said in non VPN Cloud based storage:

      @Dashrender said in non VPN Cloud based storage:

      Cost is an issue? Assuming you got hosted SharePoint only I think it's $4/u/m...

      Tiny capacity, though.

      1 TB per user?

      That's ODfB. The Sharepoint storage proper is like 100MB.

      OMG, that's near useless!

      It's only for documents. Goes a long way when used as intended.

      Used as intended? That's a joke, right? Storing large PDFs should be a part of the intention. DWG files can be huge.

    • bigbearB

      Best Practices - Securing your Windows Server 2016 VM on Vultr

      Watching Ignoring Scheduled Pinned Locked Moved IT Discussion fail2ban vultr iaas windows windows server windoes server 2016 security hosting reverse proxy vpn zerotier directaccess rds azure
      55
      0 Votes
      55 Posts
      10k Views
      U

      @syko24 free... and useless:

      Limitations of the free license:

      The free license is limited to five locks per day which means the free edition defends your system against five unique attacks per day. [...] The free license does not contain reporting (like the PRO edition does).

      Also, no official support for Windows Server 2016.

      https://cyberarms.net/download-pricing/installation-configuration.aspx

    • mlnewsM

      PowerPoint Hovering Attack

      Watching Ignoring Scheduled Pinned Locked Moved News powerpoint security trojan softpedia malware
      3
      0 Votes
      3 Posts
      1k Views
      scottalanmillerS

      @EddieJennings said in PowerPoint Hovering Attack:

      @mlnews Looks like the tl;dr is don't enable content unless you're 100% sure of the source.

      Or download it. Or open it....

    • gjacobseG

      MS VPN connection; Account locked

      Watching Ignoring Scheduled Pinned Locked Moved IT Discussion aduc security account lockouts surfacepro3 surface pro 3 laptop
      18
      0 Votes
      18 Posts
      3k Views
      scottalanmillerS

      @Mike-Davis said in MS VPN connection; Account locked:

      @JaredBusch said in MS VPN connection; Account locked:

      @scottalanmiller said in MS VPN connection; Account locked:

      To sign into the domain, your VPN goes up first. To sign into the laptop, you sign in cached and then fire up the VPN. There is a reason that VPN-first systems like OpenVPN, Pertino, ZeroTier, etc. are so important. They let you do things like central revocation because they always get updates from AD.

      Correct. this is the problem. always.

      How does that work when they are on a wifi connection that doesn't connect until after they log in to their laptop?

      You have cached creds for that. Log in, connect, reboot.

    • gjacobseG

      Korora Lock Screen: Invalid Password

      Watching Ignoring Scheduled Pinned Locked Moved Solved IT Discussion korora 25 fedora cinimmon security
      15
      0 Votes
      15 Posts
      2k Views
      gjacobseG

      Thank you, the reboot did work on this one.

      Will try a few lock cycles just to confirm.

    • DustinB3403D

      BackBlaze B2 - Secondary Accounts

      Watching Ignoring Scheduled Pinned Locked Moved Solved IT Discussion backblaze b2 security access
      3
      0 Votes
      3 Posts
      943 Views
      DustinB3403D

      Found exactly what I needed.

      "A Group is a collection of Backblaze users. All Groups have billing centrally managed by an administrator and allow administrators to keep track of the Group member’s backup statuses, B2 usage, and any alerts that members may have on their Backblaze accounts. Best of all, Groups bring added functionality to Backblaze at no extra cost."

    • 1
    • 2
    • 9
    • 10
    • 11
    • 12
    • 13
    • 31
    • 32
    • 11 / 32