ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login
    1. Topics
    2. Tags
    3. security
    Log in to post
    • All categories
    • wrx7mW

      Website Localization Testing - E-commerce Manager Requesting 3rd-Party VPN/Proxy

      IT Discussion
      • website localization vpn proxy security • • wrx7m
      7
      1
      Votes
      7
      Posts
      1.6k
      Views

      wrx7mW

      @ambarishrh Thanks. I just sent him that link to check it out.

    • scottalanmillerS

      What Exactly Is a VPN, Is HTTPS a VPN SAMIT Video

      IT Discussion
      • samit security networking vpn https ssl tunneling encryption youtube scott alan miller • • scottalanmiller
      28
      4
      Votes
      28
      Posts
      4.5k
      Views

      scottalanmillerS

      @zubairkhanzhk you're welcome!

    • mlnewsM

      Stingrays Allow Government to Hijack Your Cell Phone Communications

      News
      • stingray mobile telephony ars technica security texting • • mlnews
      3
      0
      Votes
      3
      Posts
      917
      Views

      StrongBadS

      Maybe for the best, need to teach people not to trust their phones.

    • mlnewsM

      Log Into Windows with a Biometric Ring

      News
      • windows security biometrics softpedia • • mlnews
      7
      2
      Votes
      7
      Posts
      1.6k
      Views

      scottalanmillerS

      @Tim_G said in Log Into Windows with a Biometric Ring:

      @Dashrender said in Log Into Windows with a Biometric Ring:

      So now you start stealing rings... lol

      It's harder to steal a ring than credentials through phishing emails, as one example.

      Quite a bit more 🙂 And easier to know when it has been stolen.

      Now if the ring could read heart or other biometric and only work when on the right person's finger(s), even better.

    • mlnewsM

      Windows Users Location Identified in Seconds

      News
      • wikileaks windows security location services • • mlnews
      1
      3
      Votes
      1
      Posts
      665
      Views

      No one has replied

    • mlnewsM

      NotPetya Might Have Not Have Been an NSA Leak

      News
      • nsa malware security • • mlnews
      6
      0
      Votes
      6
      Posts
      1.4k
      Views

      stusS

      After monitoring this new outbreak for 24 hours, I came to the conclusion we were dealing with cyber warfare, and not ransomware. Two separate reports coming from Comae Technologies and Kaspersky Lab experts confirm this now.

      NotPetya is a destructive disk wiper similar to Shamoon which has been targeting Saudi Arabia in the recent past. Note that Shamoon actually deleted files, NotPetya goes about it slightly different, it does not delete any data but simply makes it unusable by locking the files and then throwing away the key. The end result is the same.

      Someone is hijacking known ransomware families and using them to attack Ukrainian computer systems. Guess who.

      You never had a chance to recover your files. There are several technical indicators that NotPetya was only made to look as ransomware as a smoke screen:

      It never bothers to generate a valid infection ID The Master File Table gets overwritten and is not recoverable The author of the original Petya also made it clear NotPetya was not his work

      This has actually happened earlier. Foreshadowing the NotPetya attack, the author of the AES-NI ransomware said in May he did not create the XData ransomware, which was also used in targeted attacks against Ukraine. Furthermore, both XData and NotPetya used the same distribution vector, the update servers of a Ukrainian accounting software maker.

      Catalin Cimpanu, the Security News Editor for Bleepingcomputer stated: "The consensus on NotPetya has shifted dramatically in the past 24 hours, and nobody would be wrong to say that NotPetya is on the same level with Stuxnet and BlackEnergy, two malware families used for political purposes and for their destructive effects. Evidence is clearly mounting that NotPetya is a cyber-weapon and not just some overly-aggressive ransomware."

      Cybersecurity has moved from tech to a CEO and Board-level business issue

      You did not sign up for this, but today it is abundantly clear that as an IT pro you are have just found yourself on the front line of 21-st century cyber war. Cybersecurity has moved from tech to a CEO and Board-level business issue. I strongly suggest you have another look at your defense-in-depth, and make sure to:

      Have weapons-grade backups
      Religiously patch
      Step users through new-school security awareness training.

    • gjacobseG

      AD User Tool: Bulk AD User

      IT Discussion
      • server 2012 r2 security ad active directory domain domain active directory password reset password • • gjacobse
      15
      1
      Votes
      15
      Posts
      3.9k
      Views

      DashrenderD

      @dbeato said in AD User Tool: Bulk AD User:

      @Dashrender Then, he needs to force it with Powershell no just a GUI....

      Agreed.

    • gjacobseG

      Nextcloud: seeding company 400GBs

      IT Discussion
      • nextcloud 12 shares filesystems file sharing security • • gjacobse
      5
      1
      Votes
      5
      Posts
      1.2k
      Views

      JaredBuschJ

      New build? Create the "admin" account that will "own" the share.
      Then use rsync to upload everything.
      Then use the occ command to rescan the directory.

    • scottalanmillerS

      Comparing Fax and Email Security

      IT Discussion
      • fax hipaa security email smtp • • scottalanmiller
      24
      2
      Votes
      24
      Posts
      3.9k
      Views

      scottalanmillerS

      @BRRABill said in Comparing Fax and Email Security:

      @scottalanmiller said in Comparing Fax and Email Security:

      @BRRABill said in Comparing Fax and Email Security:

      P.S. Are you getting paid by some strange company to use the word "corruption" this week?

      Calling it as it is. The world is a very corrupt place and most of it happens because society conditions us to feel like it is acceptable.

      And there it is ... AGAIN! 🙂

      Society hasn't changed, it's just how it is.

    • stusS

      [ALERT] Looks Like A New Worldwide Ransomware Outbreak

      IT Discussion
      • security malware ransomware knowbe4 knowbe4 blog windows patching zero day • • stus
      2
      3
      Votes
      2
      Posts
      1.2k
      Views

      DanpD

      @stus Thanks. Was just reading about it here.

    • gjacobseG

      Temporary Profile in RDS session

      IT Discussion
      • security profiles rds remote desktops thin client • • gjacobse
      9
      1
      Votes
      9
      Posts
      8.6k
      Views

      gjacobseG

      Rebooted - profile created.

    • EddieJenningsE

      SSH and FreePBX

      IT Discussion
      • freepbx 13 ssh security sudo cli • • EddieJennings
      10
      0
      Votes
      10
      Posts
      7.2k
      Views

      JaredBuschJ

      And easy enough to resolve once I look.

      @EddieJennings you should have reminded me to look more earlier..

      /etc/sudoers has it commented out.

      ## Allows people in group wheel to run all commands # %wheel ALL=(ALL) ALL ## Same thing without a password # %wheel ALL=(ALL) NOPASSWD: ALL
    • bjB

      Firewalls, the good, the bad, and the ugly.

      IT Discussion
      • firewall pfsense asa sonicwall palo alto security ubnt ubiquiti • • bj
      66
      0
      Votes
      66
      Posts
      9.3k
      Views

      bigbearB

      Just wanted to add @bj to this thread that I think a $100-ish Cloud Router from Mikrotik would blow most hardware away, including Ubiquiti, on pure performance. With the $50 and under models you are still getting 1 million PPS. The new cloud router series really has a crazy amount of power.

      This still coming from a pure PPS (packets per second) point of view.

      I think the cheapest cloud router has 12 to 16 cores That would only count for the core routers I am more familiar with (12 to 24 now) in the $500 range.

      Very poor marketing in the states but very popular with western country WISPS.

    • EddieJenningsE

      Call Traffic Mystery

      IT Discussion
      • voip phone call routing security • • EddieJennings
      9
      1
      Votes
      9
      Posts
      1.6k
      Views

      EddieJenningsE

      I think I understand the basic process of the scammer.

      They call us toll-free. During that toll-free call, they use the compromised extension to make a long-distance call.

    • gjacobseG

      non VPN Cloud based storage

      IT Discussion
      • dropbox nextcloud open source pdf sharepoint cloud storage photos security owncloud box.net • • gjacobse
      29
      0
      Votes
      29
      Posts
      5.5k
      Views

      DashrenderD

      @scottalanmiller said in non VPN Cloud based storage:

      @Dashrender said in non VPN Cloud based storage:

      @scottalanmiller said in non VPN Cloud based storage:

      @Dashrender said in non VPN Cloud based storage:

      @scottalanmiller said in non VPN Cloud based storage:

      @Dashrender said in non VPN Cloud based storage:

      Cost is an issue? Assuming you got hosted SharePoint only I think it's $4/u/m...

      Tiny capacity, though.

      1 TB per user?

      That's ODfB. The Sharepoint storage proper is like 100MB.

      OMG, that's near useless!

      It's only for documents. Goes a long way when used as intended.

      Used as intended? That's a joke, right? Storing large PDFs should be a part of the intention. DWG files can be huge.

    • bigbearB

      Best Practices - Securing your Windows Server 2016 VM on Vultr

      IT Discussion
      • fail2ban vultr iaas windows windows server windoes server 2016 security hosting reverse proxy vpn zerotier directaccess rds azure • • bigbear
      55
      0
      Votes
      55
      Posts
      9.5k
      Views

      U

      @syko24 free... and useless:

      Limitations of the free license:

      The free license is limited to five locks per day which means the free edition defends your system against five unique attacks per day. [...] The free license does not contain reporting (like the PRO edition does).

      Also, no official support for Windows Server 2016.

      https://cyberarms.net/download-pricing/installation-configuration.aspx

    • mlnewsM

      PowerPoint Hovering Attack

      News
      • powerpoint security trojan softpedia malware • • mlnews
      3
      0
      Votes
      3
      Posts
      1.1k
      Views

      scottalanmillerS

      @EddieJennings said in PowerPoint Hovering Attack:

      @mlnews Looks like the tl;dr is don't enable content unless you're 100% sure of the source.

      Or download it. Or open it....

    • gjacobseG

      MS VPN connection; Account locked

      IT Discussion
      • aduc security account lockouts surfacepro3 surface pro 3 laptop • • gjacobse
      18
      0
      Votes
      18
      Posts
      3.4k
      Views

      scottalanmillerS

      @Mike-Davis said in MS VPN connection; Account locked:

      @JaredBusch said in MS VPN connection; Account locked:

      @scottalanmiller said in MS VPN connection; Account locked:

      To sign into the domain, your VPN goes up first. To sign into the laptop, you sign in cached and then fire up the VPN. There is a reason that VPN-first systems like OpenVPN, Pertino, ZeroTier, etc. are so important. They let you do things like central revocation because they always get updates from AD.

      Correct. this is the problem. always.

      How does that work when they are on a wifi connection that doesn't connect until after they log in to their laptop?

      You have cached creds for that. Log in, connect, reboot.

    • gjacobseG

      Solved Korora Lock Screen: Invalid Password

      IT Discussion
      • korora 25 fedora cinimmon security • • gjacobse
      15
      0
      Votes
      15
      Posts
      2.0k
      Views

      gjacobseG

      Thank you, the reboot did work on this one.

      Will try a few lock cycles just to confirm.

    • DustinB3403D

      Solved BackBlaze B2 - Secondary Accounts

      IT Discussion
      • backblaze b2 security access • • DustinB3403
      3
      0
      Votes
      3
      Posts
      938
      Views

      DustinB3403D

      Found exactly what I needed.

      "A Group is a collection of Backblaze users. All Groups have billing centrally managed by an administrator and allow administrators to keep track of the Group member’s backup statuses, B2 usage, and any alerts that members may have on their Backblaze accounts. Best of all, Groups bring added functionality to Backblaze at no extra cost."

    • 1
    • 2
    • 9
    • 10
    • 11
    • 12
    • 13
    • 31
    • 32
    • 11 / 32