Online Tech Community

Where Your Tech Issues Are Solved

Connect with 10M+ tech pros who can solve problems, complete projects, and help you learn more—faster.

Please enter a first name

Please enter a last name

Must be at least 4 characters long.

By clicking you are agreeing to Experts Exchange's Terms of Use

Member Login

Don't have a membership? Join now

Contact us if you have any questions.

Filter your feed by interest or job role:
Recent activity in Security

Hundreds of failed logon attempts from itself 4625

I am getting Hundreds of these cannot figure out why. Subject:       Security ID:            SYSTEM       Account …
Hire Technology Freelancers with Gigs

Work with freelancers specializing in everything from database administration to programming, who have proven themselves as experts in their field. Hire the best, collaborate easily, pay securely, and get projects done right.

Limiting what shared printers can be seen from "Add printer"

Hi all, We have a number of customers in the same AD 2008 domain. The customers are separated in…

Apply SSL to Amazon EC2 Instance

Hello Experts, I have a java based web application running on EC2 instance. I have pointed our …
Very worthwhile Bounty Programs by Microsoft Security TechCenter …

Netlogon Error 5774 - DNS - Users losing access to internet and network drives / applications

I am receiving intermittent issues on a client server. After a while, users cannot access the …

vm risk assessment

Are there any standard risks (by this I mean those that could affect any VM regardless of its …

How to tell who created a user account

A local account was created and changed on a Windows 2008 R2 member server by a hacker. I have …

Looking for a tool to encrypt sensitive files.

Hello, We have a lot of documents that contain sensitive data.  I am looking for a good tool …

Need Fail2Ban regex for wp-login attempts

Need help with regex for fail2ban to stop wp-login attempts.  Here is my jail.local.  I am on a …

Service to prevent viruses and spam from getting into my end users Inbox

I need a service to monitor incoming emails to prevent viruses and spam from getting to my clients.
Take Control of Web Hosting For Your Clients

As a web developer or IT admin, successfully managing multiple client accounts can be challenging. In this webinar we will look at the tools provided by Media Temple and Plesk to make managing your clients’ hosting easier.

HIPAA matter to mhealth apps more than ever, why? mHealth apps have come to service doctors and …

Need Flex connector for SWIFT banking application

I need to integrate SWIFT Banking application to ArcSight. Need to understand what kind of logs …

cross site request forgery

I found this security norms in web application cross site request forgery app scan report , …

Are companies already ready for GDPR

A question that many companies need to answer until May 25th of 2018... Is your company ready for GDPR?


This website is keep popping up every time when i try to load any web page. I have malware bytes but…


I need to decrypt 4 files. files of type FAIRYTAIL. with the help of this program I did not work …

Cannot demote Last DC in Domain Server 2012 R2

We have 3 domains (not child) and I have been trying to remove one of them (not root) to get us down…

Process and Considerations for Upgrading ASA and ASDM?

Good day folks This month I am going to upgrade our Cisco ASA and ASDM.  I want to go from ASA …

HTTPS Content Filtering in SonicWall CFS and Office 365 / Outlook 2016

When I enable HTTPS Content Filtering in our SonicWall CFS, connectivity to Office 365 breaks very …
Free Tool: ZipGrep

ZipGrep is a utility that can list and search zip (.war, .ear, .jar, etc) archives for text patterns, without the need to extract the archive's contents.

One of a set of tools we're offering as a way to say thank you for being a part of the community.

Exactly replace the deprecated GetBytes() with Rfc2898DeriveBytes()

Hello Experts! I need to convert the following to use the new Rfc2898DeriveBytes() to exactly …

PENTest: How Vulnerable are query string parameters and their values?

How Vulnerable are query string parameters and their values? I am curious how vulnerable a …

Spyware/Keylogger found on machine......

Hi guys, We've found a Key Logger on someone's PC in our U.S offices. The trojan is …

Office 365 Business Preium or E3 GDPR and limits

We have a mix of Office 365 Business Premium (BP) 65 and E3 175 licenses and I need to justify why I…

CDP and AIA Location

Hi, recently in my environment was put a new subordinate CA with SHA2. I need remove old sub CA …

monitor changes from specific help desk user on Active Directory

I require a tool or software where we can monitor changes from specific help desk user on Active …
Who is Experts Exchange

We’re an online community of sysadmins, developers, and tech users who enjoy learning and helping each other.

You can use Experts Exchange to solve your technology challenges, receive live 1:1 help, seek mentors, and educate yourself on technology that matters to you.

Join Now

Train Online

Develop new skills through online courses in topics like security, system administration, virtualization, and design.

Course of the Month6 days, 14 hours left to enroll
Android App Development

Premium members can enroll in this course at no extra cost.

Learn More
6 lessons

Solve Urgent Issues

Submit your toughest questions for the community to solve, or receive 1:1 help in real time when you need the fastest resolution.

Ask my Question Get 1:1 help

Need a membership for work?

Team accounts available.

Create my Team Account

Connect with Mentors

Collaborate with subject-matter experts in real time for instant help through live chat.

View Mentors

Build Your Reputation

Share your knowledge, help others in the community, and move up the ranks to become an expert.

Join Now

See Content