Security

22K

Solutions

130

Articles & Videos

20K

Contributors

Security is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide. Computer systems now include a very wide variety of "smart" devices, including smartphones, televisions and tiny devices as part of the Internet of Things -– and networks include not only the Internet and private data networks, but also Bluetooth, Wi-Fi and other wireless networks.

Refine results

Hi,

I want to get rid of the Outlook security alert. The alert says: The name on the security certificate is invalid or does not match the name of the site.

We have on-premise Exchange 2010. The…

2070 views
Complete VMware vSphere® ESX(i) & Hyper-V Backup

Capture your entire system, including the host, with patented disk imaging integrated with VMware VADP / Microsoft VSS and RCT. RTOs is as low as 15 seconds with Acronis Active Restore™. You can enjoy unlimited P2V/V2V migrations from any source (even from a different hypervisor)

I had this question after viewing strings to secure devices (https://www.experts-exchange.com/questions/28980338/strings-to-secure-devices.html).

https://www.amazon.com/Anti-Theft-Security-Hardware…

321 views

I have new users from child domain with Lync account. He can make call and join meeting sent my other. but if he send an invitation, himself and other co-worker not able join the meeting.

all of t…

718 views

We are restoring a database sent by one of our customers to a different SQL server at our location.  The database backup works fine but the application requires logins that are part of the database al…

624 views

Hi guys.
As part of a security audit I'm doing on our Virtual environment who was unfortunately badly maintained for a long, I'm trying to write a script that will send a message when a user is locke…

1141 views

Q1:
What are the most secure factors to consider when doing the above?  IPsec with 3Des?

Q2:
Symmetric or Asymmetric?

Q3:
If we're using Telco's VPN via Internet pipes, the VPN (ie encryption…

322 views

Hello Experts,

I'm trying to retrieve the authorization bearer token from the response header. In Chrome, I can see it in on the Network tab (see image), but I can't find it on the Console tab.

3440 views

Hi,

i am looking for free tool to protect data in work-group environment. i want to lock my files not to open in any other system. we are using windows 7 and 8. home and business mix system.

Tha…

739 views

I am trying to access and backup a couple of databases from 2008 R2 SQL SMS /

looks like it is in mixed mode - the current windows users is getting a Security context error...

They do not know …

823 views

Last week, we were phoned by a company called "Dissect Cyber" (say2.us). The caller claimed to be a DHS contractor and said that our domain had been forged earlier that day and we may expect to receiv…

325 views
How to run any project with ease

Manage projects of all sizes how you want. Great for personal to-do lists, project milestones, team priorities and launch plans.
- Combine task lists, docs, spreadsheets, and chat in one
- View and edit from mobile/offline
- Cut down on emails

I have my password info stored in my Dashlane software and it is an extension in my Chrome browser. There is an option to export the information for backup purposes. There are 2 options, secure which …

428 views

Hi,
We use Access Based Enumeration on Window 2012 R2 Servers to hide folders people shouldnt see.
It works well.

However, enabling it is a pain. Often the IT Admins forget to enable it as its in…

339 views

I've enabled private VLAN edges on our switches. Now, a user needs RDP access to his PC from another workstation. He is a member of the Remote Admin group on his PC. How do I configure the port to all…

949 views

Hi,

Trying to create a portable install for Surface Pro 4

Created image with MDT, mounted with DISM /Mount-Image command to c:\Test\OffLine then after preparing USB stick (D:) used this command …

1253 views

Many FX traders & dealers in banks use Reuters Messenger & others to get quotes & market info :
understand these laptops are not on dedicated/isolated networks but connect to the banks'
corporate LA…

240 views

I am about to talk to a company interested in hiring me as their IT person on contract basis. This company is based in South Carolina (SC) and it has 4 branches within SC and two other branches in two…

1788 views

I want to view which folders on a netapp a security group is granted NTFS permssions.

How can this be accomplished? Powershell?

651 views

Hi My company added a couple of SIP lines to our MX box (Zultys MX 250). We ordered a separate cable modem and 7Mbps/768k plan from Time Warner and have the modem plugged directly into the MX box. Eve…

463 views

Hello Experts,

Looking for a solution that will help us evaluate software before we install it on a production machine.
Details are as follows:
Platform: Windows 10 pro (64 bit)
Hardware: Varies…

759 views
Do You Know the 4 Main Threat Actor Types?

Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.

One of my clients send me the scurity audit requirements and One of the Point is stating

On active Directory Servers : Update OpenSSL 1.0.1s (How do you do that ? Does all the Active Directory serv…

263 views

I was wondering if Enabling File and Printer Sharing on all servers is vulnerability?


The purpose of this is so that we can copy files btw servers. Do we need to enable it? What if we run Powersh…

656 views

Find out what Office 365 Transport Rules are, how they work and their limitations managing Office 365 signatures.

038 views
Password security

Never store passwords in plain text or just their hash: it seems a no-brainier, but there are still plenty of people doing that. I present the why and how on this subject, offering my own real life solution that you can implement right away, bringing your solution beyond military grade security.

0137 views

Sorry for the "Generic" question but heading into a meeting shortly and want to be educated by my fellow experts. Our consultant wants me to move an enterprise version of Malwarebytes that resides ins…

667 views

I constantly struggle with deleting folders or files due to permissions.  For example I was testing our backup software and restored a backup of one folder with multiple sub-folders.   I tried to dele…

460 views
Show more content
201506-LO-Top-001

Vendor Experts

Western DigitalWestern Digital
Contact
Learn more about Western Digital

TOP EXPERTS

view all

RELATED TOPICS view all topics

  1. OS Security
    (21,451)
  2. Software Firewalls
    (19,704)
  3. Encryption
    (6,860)
  4. Vulnerabilities
    (6,587)
  5. Anti-Virus Apps
    (22,108)
  6. Network Security
    (6,159)
  7. Active Directory
    (72,703)
  8. Networking
    (89,128)
  9. Windows Server 2003
    (128,510)
  10. IPsec
    (5,867)