OS Security

21K

Solutions

23K

Contributors

Operating system security (OS security) is the process of ensuring OS integrity, confidentiality and availability. OS security refers to specified steps or measures used to protect the OS from threats, viruses, worms, malware or remote hacker intrusions. OS security encompasses all preventive-control techniques, which safeguard any computer assets capable of being stolen, edited or deleted if OS security is compromised, including authentication, passwords and threats to systems and programs.

Share tech news, updates, or what's on your mind.

Sign up to Post

Hi,

My user required to install software frequently on one of windows 2008 server , for that he has requested local admin rights, but I would like to know before granting him local admin rights whether he can  install software  with other privileges , if so what are all other alternatives to follow least privileges policy in granting him rights?
0
Evaluating UTMs? Here's what you need to know!
LVL 1
Evaluating UTMs? Here's what you need to know!

Evaluating a UTM appliance and vendor can prove to be an overwhelming exercise.  How can you make sure that you're getting the security that your organization needs without breaking the bank? Check out our UTM Buyer's Guide for more information on what you should be looking for!

We would like to know if we can create keyfiles of an existing volume in order to use the keyfiles to open the volume if the user forgets the password.  Some time back an EE commented on keyfiles with similar topic bit haven't been able to find it.   Can this be done? (trying to safeguard access to the volume if the users forget)
0
 
LVL 41

Expert Comment

by:noci
lookat bugtraq   and look for "Defense in depth the microsoft way" a now 52 part series.
... of microsoft not following their own advise. (With a side step of 30 something installer failures).
0
Hi guys,

We've found a Key Logger on someone's PC in our U.S offices. The trojan is Trojan.Boaxxe and it has indeed spotted 'Spyware.Ursnif' all over the place. We had some fraudulent activities occur in November 2017.

I've even included the snapshot for you of the findings. When I go to the .txt files you can see, it definitely has November dates which is when the frauds occurred. However, if I go to the 'Tojan.boaxxe' location which is in the Appdata\Local\YJPack location, the date for that is 2015. I'm trying to work out when the actual keylogger was installed.

Is there anyway of finding that out? And how on earth would a keylogger have been installed? Would it usually be through a manual installation or a possible script via phishing etc?

Thank for helping
Yashy
Spyware.jpg
0
I have 5 new Windows 10 Pro machines that will NOT be on a domain and will NOT be in Active Directory

How can I create a PowerShell/etc script I can run on each machine to create four local admin accounts (ITDept1/pass1, ITDept2/pass2, ITDept3/pass3) and add these account to the "Local Admin" group ?
0
Greetings EE'ers,

This is a bit of an open ended question, but what do you all use or recommend as tools or practices for performing IT security assessments?
0
Dear
How I can configure exchange 2007 to accept more recent cypher than RC4.
thanks
I have Exchange 2007 installed on windows server 2003
0
Removal Instructions:

Too many removals this week, we recommend you read and implement our suggestions, and try again later.

212.60.70.174
0
In our as400 hardening doc, we currently allow 3 concurrent sessions per userid but our HQ new generic security policy recommends 1 session per Id

Was told that a user will require to run different types of jobs concurrently and often the jobs can take a while to complete even in our upgraded faster system I os400 v7 r2

What’s the practices out there?

CIS does not publish any hardening guide for os400
0
Very suspicious Windows Defender Scan.

I sent my Lenovo Desktop in for repair to Lenovo's Depot in Louisville, KY via FedEx.
I shipped it from Gunnison, CO on Tuesday, January 30th.
It was received in Louisville, KY on Friday, February 2nd stating it was on the vehicle for delivery.
It was received by Lenovo on Monday, February 5th.

This is were it gets strange. I received my computer back from Lenovo Monday, February 12th. Last night I was reviewing a Windows Defender scan and see it had quarantined Trojan:Win32/Fuerboos.B!cl 3 times on February 2nd. My computer should have been in a box with no electricity. How would Windows Defender be able to run a scan? The same Trojan was detected and quarantined on February 12th the day I reconnected it in my office.

WD Security Scan
Does anyone have any explanation for this?
Thanks,
Mags
0
SMB Security Just Got a Layer Stronger
LVL 1
SMB Security Just Got a Layer Stronger

WatchGuard acquires Percipient Networks to extend protection to the DNS layer, further increasing the value of Total Security Suite.  Learn more about what this means for you and how you can improve your security with WatchGuard today!

Hello,

I am using this link to check my TLS status of my IIS web server: https://www.ssllabs.com/ssltest/analyze.html?d=casnet.casusa.com

I see that TLS 1.1, 1.2 is enabled.  1.0 is disabled.  

When I go back to my WEB server's registry, I do not see TLS 1.2.  

Please see the screenshot and advise if you know why TLS 1.2 is not displayed in the registry.  

Thanks.
tls.png
0
Where can I get a working copy of the forensics tool COFEE?

I've got a copy from Wiki leak but when trying to run the msi, it says "incorrect parameter".
Can't locate it in MS site.
0
SM-G920P
samsung galaxy s6
android 7 


developer tools
in settings

i got there by clicking on location spoofing app

but can not find it
i type in developer in search box
0
My OS is win10 pro 64 bit and I am researching for a good and safe Ad blocker software, ideally of course if it is FREE.  Thank u for your suggestions. Regards
0
Hi All, looking for a pen testing solution we can use to test our external and internal network, what do you recommend?

Thanks!
0
My OS is win10 pro 64 bit.  Due to recent security hacking on my pc, I am thinking if NordVPN would provide the security preventing everyone from entry.  I have Avast Premier protection.  Or can I use ZoneAlarm or some other software.  Thank u and regards.
0
My OS is win 10 pro 64 bit.  My pc is a lennovo m72e.   I use Verizon DSL and the pc is connected via a modem, which has about 5 ports, allowing for ethernet connection.  Last week a hacker managed to hack into my pc.  My question is if I were to change the port which the ethernet cable is connected, can the hacker get into my pc again?  I have Avast security protection and the OS' own.  thank u
0
I have an AIX 6.1.9 version, I need to update IBM WebShere MQ.

Now I have version 6.0.2.3, which version can I get as an update?

Operationally what operations do I have to do to upgrade?
0
I have an AIX 6.1.9 version that is end of support, how can I update the security patches periodically?
0
[Webinar] Improve your customer journey
LVL 12
[Webinar] Improve your customer journey

A positive customer journey is important in attracting and retaining business. To improve this experience, you can use Google Maps APIs to increase checkout conversions, boost user engagement, and optimize order fulfillment. Learn how in this webinar presented by Dito.

What to do about possible apple based hack - An iPhone 6, an iPhone 7, an iPhone X, an iPad AirLight, and a Macbook Air

These were under the same iCloud password, which has been changed since.

Symptoms:

1. When it started, the owner was using his MacBook Air and all of a sudden he lost control and files started moving around and then deleting themselves as if he was being remotely accessed. When it was done, he went into his contacts and there was only one contact left. He restored his devices, and watched for other symptoms.

2. Messages keep going across the screen on the iPhone X, like foreign languages along with the words "delete a" and ",". When he tries to find these messages they are nowhere to be found.

3. Other messages being sent to the devices and then automatically deleting themselves. Some of these messages involved the people he thinks were involved.

... along with some general strange behavior that we're doing updates and cleanup with to make sure they're not related.

He has an idea who might have done it, they have been contacting him and they are a shady character. They haven't admitted anything. The owner's concerned he's still hacked, and he wants to find out who did it and clean up the situation. He is under a secure, hidden network in a remote location and isn't sure if his network has been compromised. We've updated all the devices to the most current iOS, and took off any shady programs. We ran malwarebytes on everything and …
0
Anyone had a virus like that that turning usb into shortcuts and even deleting files as well?

I suspect it is on a particular system

How to fix this ?
0
Hi,
I added a Content-Security-Policy that works in Firefox and Chrome but not Safari.  I am using Safari 10.1.2. In Safari I get the error:
“Refused to apply a stylesheet because its hash, its nonce, or 'unsafe-inline' does not appear in the style-src directive of the Content Security Policy.”
So, I tried adding ‘unsafe-inline' to style-src but I still get the error in Safari.  I have some hashes in style-src (that were provided by Chrome), and when I get rid of the hash, Safari gives no errors as long as I have ‘unsafe-inline’ written.  If I put the hash back in, I get the error again in Safari.  The other browsers work fine.  Does anyone know what I can do to get the Content-Security-Policy working in Safari?  Any help is greatly appreciated!
0
Recently a scammer posing as the support for coinbase connected with me and I found later that he was a scammer.  How do I find out all the programs that he installed without my  knowledge.  I did a s ystem a restore to a previous date, but today my program loaded by itself and emptied my account.  Can the experts please  suggest what software(s) I should run, especially if he had disabled my virus, firewall and also defender protectioin. thank u.
0
A few staff left the company & there's no  handover/documentation.

I was told by one colleague that placing it in the incorrect folder for the apps to read is one of the
main challenges :
we have a few sites with our outsource providers ie it may differ in folder locations for different
apps.

Can someone provide step by step instruction on how to generate new keys (it's required yearly
by Audit) & send over to remote end &  how to check where to place them in right place for decrypting
(& if there's steps to decrypt it, let me know).

It's all on Win 7 and Win 2008 R2
0
I am looking for a broad scope on penetration testing/vulnerability exercises to engage a tender for 6-monthly assessments of our network. Most 3rd parties seem to steer you on the areas that should be included, but I was hoping for a more independent view on what type of areas are typically included for a thorough review, e.g. wireless, web apps, network devices, perimeter, build standards, end user equipment, telephony etc? I presume they will test as little or as much as you pay for, but some guidance on critical/desirable/little value per category would be most helpful so we know we are covering the critical areas at bare minimum, in line with budget.

Also any guidance on certifications of companies to look out for as a marker of quality service, would also be useful.
0

OS Security

21K

Solutions

23K

Contributors

Operating system security (OS security) is the process of ensuring OS integrity, confidentiality and availability. OS security refers to specified steps or measures used to protect the OS from threats, viruses, worms, malware or remote hacker intrusions. OS security encompasses all preventive-control techniques, which safeguard any computer assets capable of being stolen, edited or deleted if OS security is compromised, including authentication, passwords and threats to systems and programs.