OS Security

21K

Solutions

55

Articles & Videos

20K

Contributors

Operating system security (OS security) is the process of ensuring OS integrity, confidentiality and availability. OS security refers to specified steps or measures used to protect the OS from threats, viruses, worms, malware or remote hacker intrusions. OS security encompasses all preventive-control techniques, which safeguard any computer assets capable of being stolen, edited or deleted if OS security is compromised, including authentication, passwords and threats to systems and programs.

Refine results

Hi,


I need to setup static routes

i basically want to

destination 8.8.8.8  -->  169.38.73.5

destination 8.8.4.4 --> 195.28.181.161



basically so 8.8.8.8 is translated to …

441 views
Three Reasons Why Backup is Strategic
Three Reasons Why Backup is Strategic

Backup is strategic to your business because your data is strategic to your business. Without backup, your business will fail. This white paper explains why it is vital for you to design and immediately execute a backup strategy to protect 100 percent of your data.

Are there any checklists that can be used for a desktop security assessment (windows 7). We have a fresh built device which should represent the standard built assigned to all end users and want to …

230 views

We have a setup where non admin users will be using a standalone machine, and from time to time the program they are using will need to be upgraded (via an .EXE). There are 2 issues:

1) non admin …

1738 views

Hey everyone,
Have you seen this issue before when joining to the target domain?

several computers are getting this error.

Please help.

The following error occurred attempting to join the …

335 views

My PCI scan has failed and it is asking me to address the 2 issues below, can someone here help me with the case? I'm running Windows 2008 R2.

SSL Medium Strength Cipher Suites Supported
SSL …

768 views

My users want to install on the laptops that have Internet access to video record
screens.  Need to assess what are the risks if:

a) the laptops have Internet access as well
b) the videos …

953 views

C:\Windows\System32>icacls mstsc.exe
mstsc.exe BPROD\GOPO:(RX)
          NT SERVICE\TrustedInstaller:(F)
          BUILTIN\Administrators:(RX)
          NT AUTHORITY\SYSTEM:(RX)

I know how to …

835 views

What software do you recommend for
Laptop "remote wipes" or "total lockdowns"
so data cannot be taken from the harddrive
when something like the below happens
in the FUTURE ?

I assume the …

1092 views

My OS is win 10 pro 64 Bit and I use the above site to listen the recordings of my Temple's lectures.  In my login to the site today, I was asked to change the password because of :

Your email was…

426 views

Hi Experts,
     I have a windows 2008  Server  that was in the domain . I was able to login to it using my domain account ( I have admin previlage)
     But for some testing, I had to remove it …

736 views
The Eight Noble Truths of Backup and Recovery
The Eight Noble Truths of Backup and Recovery

How can IT departments tackle the challenges of a Big Data world? This white paper provides a roadmap to success and helps companies ensure that all their data is safe and secure, no matter if it resides on-premise with physical or virtual machines or in the cloud.

I’m helping one of my customers out with their website and PCI compliance has come up. They’re a theatre so have a bar / box office and e-commerce through their website. My understanding is that SAQ B…

631 views

hi all,

anyone know what is the latest edition of PCI compliance with full documentation on it.

any suggestion / step by steps guide to implement that, get it compliance

What is the risk and…

1633 views

Hi,

I work for a charity company.

We have a client/Server system: 1 Server and 7 domain users/desktop machines.
One of our users want to be able to install software without being prompted for …

495 views

Hi -

I have a client who is fairly well known in the journalism media circles. He said that he is concerned about how best he can protect the data on his pc, minimise hacking and be setup is such …

2188 views

Hi - A client called me today because his pc was acting strangely. When i logged in remotely i felt it very slow despite him being on super fast fibre. Browsing to speedtest.net would hang when i …

825 views

I have a request from some employees if there is a possibility of setting up a range for the Screen Lock out time on Windows 7/10 OS.
For e,g 2 minutes - 15 minutes.
They are asking this because we…

218 views

Some of our companies domain controllers have been setup with server core type setups, e.g. minimal installation:

https://msdn.microsoft.com/en-us/library/dd184075.aspx

So basically if you RDP …

340 views

I am able to access my SQL Server instance from within the network using SERVERNAME/Instance Name. However it does not work when I try accessing it using IP/Instance Name. I have enabled the named …

29110 views

My OS is win 10 pro 64 bit and I have msn email the free one.  My User to login into my pc is my email address and its password, that was how Microsoft set it up when I had to ask them for paid …

541 views
Ransomware: The New Cyber Threat & How to Stop It
Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

Hello,
Did anyone use subinacle for permission translation on Win 10 machine? Could you please let me know the command to process files and subfolders under c:\users\*.* and exclude specific …

352 views

My apologies in advance, as this is probably somewhat of a simple question.  We currently have a Windows web server environment with an IIS / Websphere combo.  We have already updated all of the …

293 views

My Os is win 10 pro 64 bit.  I had earlier on login problems where I was not able to login with my usual password into my pc and since the login user was my email, I had to use a laptop to get into …

343 views

Jack has 2 User Accounts on his Windows 10 PC .....
User 1 = JACK       (Ordinary User)
User 2 = ADMIN  (Administrative User)
For general security reasons, he uses the JACK a/c most of the time …

566 views

I had this question after viewing problems installing a ssl certificate on a mac that is a local machine with no domain …

335 views

Good evening experts,

my internet explorer options proxy server sectioning keep being checked by some program or perhaps a malware virus my virus scan is not picking up. I use Comcast's free …

1138 views
Show more content
201506-LO-Top-001

Vendor Experts

Western DigitalWestern Digital
Contact
Learn more about Western Digital

TOP EXPERTS

view all

RELATED TOPICS view all topics

  1. Windows Server 2003
    (128,563)
  2. Security
    (23,368)
  3. Active Directory
    (73,252)
  4. Windows XP
    (118,278)
  5. Anti-Virus Apps
    (22,173)
  6. Vulnerabilities
    (6,611)
  7. Windows Server 2008
    (82,664)
  8. Microsoft Server OS
    (55,346)
  9. Microsoft Legacy OS
    (55,077)
  10. Windows OS
    (101,369)