Security

23K

Solutions

23K

Contributors

Security is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide. Computer systems now include a very wide variety of "smart" devices, including smartphones, televisions and tiny devices as part of the Internet of Things -– and networks include not only the Internet and private data networks, but also Bluetooth, Wi-Fi and other wireless networks.

Share tech news, updates, or what's on your mind.

Sign up to Post

Hello,

When do you do network design, do you have dns record for firewall and  loadbalancer ? It is easier to see where packet is dropping.
Or any security concern on putting in DNS record?
0
Comprehensive Backup Solutions for Microsoft
LVL 4
Comprehensive Backup Solutions for Microsoft

Acronis protects the complete Microsoft technology stack: Windows Server, Windows PC, laptop and Surface data; Microsoft business applications; Microsoft Hyper-V; Azure VMs; Microsoft Windows Server 2016; Microsoft Exchange 2016 and SQL Server 2016.

Good afternoon.  I just signed up to use Comodo for endpoint security.  One of the products that I get with that is Dome, which is for DNS.  So, my question is, how do I actually set that up without messing up my internal settings?  For instance, if my computers need to resolve to an internal server I know that I need an internal DNS server.  Therefore, do I just change the DNS settings on the DNS server to use Comodo's DNS or do I set it somewhere else?
0
I'm using 11.2.0.4 for Windows 64bit. It comes with Java 5 as part of the install (I'm assuming so you don't need to have Java installed to use Oracle). How do I update that version of Java? I'm running into an error where I need the unlimited crypto package but I can't use it on Java 5 (I tried and it grenaded parts of Windows if I update the security files). I did then install Java 8 on the system but Oracle seems to look at it's own vs what is installed outside of Oracle.
0
I need to decide if I should hire a security expert to try and "break" my site.

I have the latest updates for WordPress and WooCommerce and host it at AWS as EC2.

Where kinds of security problems might I have?

I already changed the database username to no longer use "root".

Can you think of things I can do to nail down the site?

Is it worth having a security guy look at it?

Thanks.
0
We are in need of setting up a certificate authority on our public-facing server to authenticate Adobe eSignatures that are compliant with 21 CFR Part 11. Our CEO investigated doing this with Verisign or similar, and it looks like it would be very expensive that way. Can this be done in a Windows Server environment? Thank you in advance.
0
Can we create group of endpoints and can we assign policies to that group in trend deep security?
0
Hi all,

Not quite sure where this question sits, as its not really a break/fix issue, but relates to the bigger IT security picture.

We have a large number of Cisco and Huawei equipment, as well the usual lump of window and linux based platforms, and we are struggling to get a managed security policy in place to protect and block access to these network devices when previous admins and root access holders leave.
These devices are not protected by a VPN policy, and all are local accounts

So the questions here are;

  • can cisco and huawei access be defined on a centrally managed platform or database
  • can passwords for the above be remotely bulk changed
  • is there a best practises document for this

regards

phil
0
Hi,

Can anybody please help me on this i want to configure checkpoint security gateway as HTTP/HTTPS Proxy in cloud environment.

Thanks in advance
 
SAT
0
Hi, does anyone use this software before?

Do you know how to calculate the amount of license which need to be covered? And is there any risk if I install both Kaspersky Endpoint Security and Mail Security on the same server?

We have 6 Exchange Mail Servers.

Many thanks!
0
When I try to setup permissions on one clients server and add a user to a security group that is for a certain  share or folder
the user still cannot access the share. Even giving the user modify or full rights not recommended just for testing.
What could cause this? Could there be a policy stopping this? I get no popups or errors.
0
2017 Webroot Threat Report
2017 Webroot Threat Report

MSPs: Get the facts you need to protect your clients.
The 2017 Webroot Threat Report provides a uniquely insightful global view into the analysis and discoveries made by the Webroot® Threat Intelligence Platform to provide insights on key trends and risks as seen by our users.

ive been hit with a ransomware attack
I can still use the computer but all word docs have been encrypted
I can open docs but they are blank
is my only option paying or can I get these back?
they are requesting over £800
0
QTT2017.PNG
In This Issue:
Streaming Malware Detection and Trends

More information here.

Although malware and potentially unwanted applications (PUAs) such as spyware and adware have been a top concern for years, many organizations still find themselves overwhelmed by the abundance of modern threats. This quarter, we examine malware trends, get insight from Webroot CTO Hal Lonas on dissolving security perimeters, and present findings from two recent surveys on how security professionals will focus their security efforts over the next year.

Get the latest Threat Trends Report now!
2
Does anyone on here have any experience auditing Mac OSX and MacOS laptops specifically for PCI Compliance? If so, how did you end up logging from them to a centralized server and what did you use? I am attempting to use OSSEC to pull the logs from /var/audit/current but would /var/etc/com.apple.authd be better? Or /var/log/system.log?) The purpose of this is to satisfy PCI DSS req. 10.2.2, 10.1.5. If I use OSSEC will I need to create a custom decoder for OSSEC for using the praudit command on /var/audit/current?
0
Hi,

Very long story short, I am the new IT Engineer at a small business and I had the task to delete a shared network drive folder. Sounds easy right. Well, some of the sub folders don't have permissions on and I get the "The requested security information is either unavailable or can't be displayed" message in the security tab of the folders. I have tried the following:

•Taken ownership and applied Admin, my own user ID and Authenticated users permissions on the parent folder and applied the "Replace all child object permissions with inheritable permissions from this object"
•3rd party take ownership programs on the subfolders
•Rename/delete the sub folders via cmd

Anything I try can't seem to grant me permission of ownership of the sub folders. Unfortunately I don't know what was done to these sub folders as the old engineer must have done this. Any advice is greatly appreciated. Thanks!
0
We have a system in place which is hosted (SaaS) by the software manufacturer/supplier.

We have a small internal team in place to run the day-to-day admin and management of the system, like setting up new users, running reports etc.

However I’ve become concerned as I’ve been informed that the host/supplier can access the database, setup users within the database and general write directly to the tables.  This is obviously bypassing all the application controls that are in place.

We can, and probably will run reports on users so we should be able to identify any news users that might have been set up in this way.  However this is only a small fraction of what could possibly be done via the tables, for example changing the bank details for payments to your own etc.

We can try and monitor this as much as possible but it has its limits and it is detective rather then preventative controls.
The problem I think we have is that they developed this system and now they host it, so in theory they can do whatever they want.  Has anyone else been in this situation, is there anything we can put in place to prevent this happening rather than just detecting it?  At the moment the only thing I can think of is making them promise they won’t do this, which is pretty useless.

They do provide some system support so we can’t just remove their access all together and as we don’t have control over the database, we can’t insist access is disabled until they come through us to enable …
0
The recent Petya-like ransomware attack served a big blow to hundreds of banks, corporations and government offices The Acronis blog takes a closer look at this damaging worm to see what’s behind it – and offers up tips on how you can safeguard yourself from future ransomware attacks.
2
Trying to find an official Microsoft product to hash an entire drive in MD5 or SHA256.

CertUtil only works for individual files.
Get-FileHash only works for individual files.

I need something for an entire drive or set of directories and files.
0
Part One of the two-part Q&A series with MalwareTech.
6
How to block unmanaged switches from network. I have already apply BBDU Guard on interface but where unmanaged switches attached port will not block. and in show spanning-tree interface detail command no BpDU received. So please help is required for block unmaanged switches fron network. Other than port security please
0
Threat Trends for MSPs to Watch
Threat Trends for MSPs to Watch

See the findings.
Despite its humble beginnings, phishing has come a long way since those first crudely constructed emails. Today, phishing sites can appear and disappear in the length of a coffee break, and it takes more than a little know-how to keep your clients secure.

I have a schema (database) in MSSQL that is called PRODUCTION.  I also have security group setup in Active Directory called DB_USERS.  

I am having a problem with the syntax to grant the security group, (and all of the members of it), the rights of SELECT, INSERT, UPDATE, ALTER and DELETE to "all" of the tables inside of this DB.

Can someone provide me with a syntax SQL query command to do that, or alternatively, how I can do that through SSMS?   For some reason I am just not getting the syntax correct.

I tried the following script, and it creates everything, but it errors out on the last line when it comes to the GRANT command.

USE master;
GO
CREATE LOGIN [MYCOMPANY\DB_USERS] FROM WINDOWS;
GO
USE PRODUCTION;
GO
CREATE USER [MYCOMPANY\DB_USERS] FROM LOGIN [MYCOMPANY\DB_USERS];
GO
CREATE ROLE DBACCESS;
GO
EXEC sp_addrolemember 'DBACCESS', 'MYCOMPANY\DB_USERS';
GO
GRANT SELECT, INSERT,UPDATE,ALTER,DELETE ON SCHEMA::PRODUCTION TO DBACCESS;
GO

The error I am getting is "unable to access schema PRODUCTION. It does not exist or you do not have permissions."

I am logged in as SA.

Thank you in advance,
Jeff
0
1
 
LVL 18

Author Comment

by:Lucas Bishop
The acquiring company inserts adware into thousands of people's browsers and they begin earning revenue from ad-clicks and affiliate sales. Eventually people notice and uninstall the extension.

It's a pump and dump scheme. Short term they multiply profits. Long term the extension goes in the trash.
0
 
LVL 6

Expert Comment

by:Brian Matis
This is why we can't have nice things... :-(
0
Experts Exchange got the opportunity to interview MalwareTech, the 22yr old who discovered the WannaCry kill switch. Check out his advice on security and future security threats, as well as his comments on the importance of tech communities.
5
 
LVL 31

Expert Comment

by:Zoppo
Once a customer called me and told our software tells him 'Hardlock not found' - after 10 minutes verifying everything (driver, service, client) was installed fine and running, just for fun and coz I was a little bit frustrated, I aksed if he really plugged in the hardlock - the customer was a bit surprised and answered "No, it's here, laying in front of me, on my desktop - do I have to plug it somewhere?"

Another time I sent a PDF docu to a customer - he answered with a mail asking me what to do with this PDF. I wrote 'just open it to read or print it' - he answered he doesn't know what 'open' means and asked me if it would be possible that I open the PDF and send it to him 'opened'.

And one of my favorites, allthough it wasn't directly me: Once surprisingly I heard my colleague (usually a relaxed guy) yelling loud into the telephone "NO! STOP! Stop EVERYTHING! DON'T TOUCH the mouse! DON'T TOUCH ANYTHING! When I tell you 'click', click EXACTLY ONCE with the LEFT mouse button! WHEN I TELL YOU 'double click', click EXACTLY TWICE with the LEFT mouse button! As long as I don't tell you anything DON'T TOUCH ANYTHING!!!"
0
Does someone have experience with SaaS solution for network security management?
0
 
LVL 16

Expert Comment

by:Kyle Santos
Hi Asher,

Welcome to Experts Exchange.

Do you have a project in mind that you need someone to work on for you?
If yes, check out our Gigs platform.
https://www.experts-exchange.com/gigs/

If you want to look at members on the site you can go to navigation menu > Browse > Members.  There you can filter what type of expert you're looking for.
3
Hi Experts,

I am installing new wireless equipment at a very small motel this week. They have AT&T business internet and just want to provide an SSID and password/key to guests to connect. No splash screen or anything like that. They were originally using Netgear signal boosters that you plug into wall outlets, but customers stole them.

I told them I would only use pro-level equipment, so I have ordered 2 UAP-AC-PROs and the Ubiquiti 8-port 60w PoE Switch for 12 rooms. Eight rooms are in a 2-floor building, four on each floor and the other building is just four rooms on a single floor. I plan to install one AP on the ceiling in room 3 (middle, bottom room) of each building, including the two floor building. The rooms are small so I think this will suffice.

Questions:

Do I need to order a security device or new router? Can I use the AT&T provided router and connect it to the Ubiquiti PoE switch and configure the WAPs using the Ubiquiti controller software installed on the office PC? And will that software without a security device or new router be able to provide two SSIDs?

The owners are trying to save money (of course!) so I wanted to see if any other gear was necessary. It appears that the solution I've provided will do the trick, but it is not ideal security-wise. Any advice is appreciated!

Thanks,

Rich
0
I understand the exposure of having a public facing website with username root.

So, I have created a new username and changed my WordPress site to use that new username.

Shall I delete the "root" username?

Thanks.
1

Security

23K

Solutions

23K

Contributors

Security is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide. Computer systems now include a very wide variety of "smart" devices, including smartphones, televisions and tiny devices as part of the Internet of Things -– and networks include not only the Internet and private data networks, but also Bluetooth, Wi-Fi and other wireless networks.