OS Security

21K

Solutions

55

Articles & Videos

20K

Contributors

Operating system security (OS security) is the process of ensuring OS integrity, confidentiality and availability. OS security refers to specified steps or measures used to protect the OS from threats, viruses, worms, malware or remote hacker intrusions. OS security encompasses all preventive-control techniques, which safeguard any computer assets capable of being stolen, edited or deleted if OS security is compromised, including authentication, passwords and threats to systems and programs.

Refine results

We are trying to do some report for patch status of all servers in our domain - but due to firewall settings - the MBSA remote scans are not completing in full, Namely the security update status secti…

30 views
Course: MongoDB Object-Document Mapper for NodeJS

NodeJS (JavaScript on the server) is awesome, but some developers get confused about NoSQL when it comes to working in Node with MongoDB (NoSQL database). Do you need a better explanation of how to use Node.js with MongoDB? The most popular choice is the Mongoose library.

Hello Experts,

I have a new environment with windows 2012 R2 domain controllers. I would like to move the users laptops to this new domain.
Currently the users have full control on their laptops…

517 views

I'm looking for more questions for users which should cover areas like:
a) Spam emails
b) Phishing
c) Malwares & AV
d) Physical security
e) Data Confidentiality
f)  Password & password complexit…

1039 views

Friend got this....

real or fake?

Nick should I trust this E-MAIL and do what is says?




-------- Forwarded Message -------- Subject:  MICROSOFT SECURITY - CRITICAL ALERT
Date:  Tue, 20…

212 views

one of the computers is a temporary web server.  I had to put it outside of the firewall (DMZ) to make everything work because somehow the uverse router blocks everything even if I open all the ports.…

932 views

Hi

I have installed Visual studio on only 30 PCs. When they run the project , it says "Error while running the project: unable to start the program \\File server-a\Students\16\16asmith\visual stud…

2446 views

Hi, I have a network with a few hundred users. Sometimes we need to log in as a particular user to troubleshoot something, sometimes overnight or on holiday weekends, etc when getting the user on the …

1120 views

I am being asked to look at a Windows SBS 2008 server which has been decommissioned for some time.  I am being asked to see if anyone has accessed the server / files since it has been decommissioned.…

325 views

Hi evryone,
I had very strange problem,
After Suyces a Migration PKI to SHA2

and deploy new certificat in GPO and 802.1x
I had this problem authentication with workstation with Win7, after depl…

620 views

I'm trying to sieve out which of the signatures / malwares in F-Secure is ransomware.
Anyone can get me a list?

526 views
6 Surprising Benefits of Threat Intelligence

All sorts of threat intelligence is available on the web. Intelligence you can learn from, and use to anticipate and prepare for future attacks.

Just like in gmail (& my Outlook) we can't attach an executable file, is there anyway
that we can scan & block if files uploaded (by Rdp copy & paste) is say an executable
& only allow text files?

520 views

I'm exploring to set up a VM running a Linux or x86 UNIX (say x86 Solaris or x86 SCO UNIX if it's still around)
that's dedicated to browsing the Internet : using a VM because I could scale the vRAM, …

2449 views

Is RHEL or any specific OS that allows us to browse Internet and yet
highly not prone to ransomware & malware

Wanted to use it as 'jumphost' for browsing Internet

1661 views

Android: https://en.wikipedia.org/wiki/Rooting_(Android_OS)
iOS: https://en.wikipedia.org/wiki/IOS_jailbreaking

A Good linke: https://www.owasp.org/index.php/Mobile_Jailbreaking_Cheat_Sheet

I'm…

1048 views

We have a BYOD estate that's fairly large, approx 3000 devices, mainly iOS.

We enforce a minimum iOS version of 8 via our MAM software. That is, of the user isn't running iOS 8 or above, the corpor…

226 views

Hi People,

Can anyone here please help as to why the script below can display the rest of the column but not the time column ?

(CODE)

Am I missing anything here ?

415 views

I am setting up a remote virtual directory.  The share has it's own permissions and I added all the users I want to access the share through the share permissons.  The NTFS folder on the PC also has a…

828 views

Hi All,

Can anyone here share some script or explanation how can I use Powershell Get-WinEvent or Get-EventLog to get some list of AD security event ?

I need the below information to see if any …

431 views

Hi All,

I've managed to found this script (by SubSun), which sift through the Event logs for the Terminal Server:

(CODE)

So I wonder if it is can be configured / modified to filter the Securi…

838 views
Product Review - Android Remix

Come along for the ride with our Senior Product Manager, Brian Matis, as he reviews the Android Remix.

Yes?  Why do you use it?

No?  Why don't you use it?

18106 views

Hi All,

Can anyone here please share some steps or process to create secure access for the 3rd party support team ?

Description:
I have created the support account called DOMAIN\AS-Support in m…

841 views

Hi All,

I'd like to know if there is any Powershell script or software that can be used to test what my DOMAIN\Test-Account can do given certain privilege in my AD domain ?

For example: The AD a…

234 views

SHARE your personal details only on a NEED to basis. Take CHARGE and SECURE your IDENTITY.
How do I then PROTECT myself and stay in charge of my own Personal details (and) - MY own WAY...

0331 views

Container Orchestration platforms empower organizations to scale their apps at an exceptional rate. This is the reason numerous innovation-driven companies are moving apps to an appropriated datacenter wide platform that empowers them to scale at a single click.

048 views

I used to download PDF & html pages & have several cases where there's
Adobe exploits & HTML infected pages.

If I'm browsing the Internet on a Linux desktop & do copy of the html or
PDF pages & t…

635 views
Show more content
201506-LO-Top-001

Vendor Experts

Western DigitalWestern Digital
Contact
Learn more about Western Digital

TOP EXPERTS

view all

RELATED TOPICS view all topics

  1. Windows Server 2003
    (128,384)
  2. Security
    (22,627)
  3. Active Directory
    (72,103)
  4. Windows XP
    (118,203)
  5. Anti-Virus Apps
    (22,034)
  6. Vulnerabilities
    (6,559)
  7. Windows Server 2008
    (81,772)
  8. MS Server OS
    (55,207)
  9. MS Legacy OS
    (55,055)
  10. Windows OS
    (100,164)