[Webinar] Streamline your web hosting managementRegister Today

x

Security

24K

Solutions

24K

Contributors

Security is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide. Computer systems now include a very wide variety of "smart" devices, including smartphones, televisions and tiny devices as part of the Internet of Things -– and networks include not only the Internet and private data networks, but also Bluetooth, Wi-Fi and other wireless networks.

Share tech news, updates, or what's on your mind.

Sign up to Post

3D - The RIGHT Security
You do not need to be a security expert to make the RIGHT security. You just need some 3D guidance, to help lay out an action plan to secure your business operations. It does not happen overnight. You just need to start now and do the first thing right!
0
Will You Be GDPR Compliant by 5/28/2018?
LVL 1
Will You Be GDPR Compliant by 5/28/2018?

GDPR? That's a regulation for the European Union. But, if you collect data from customers or employees within the EU, then you need to know about GDPR and make sure your organization is compliant by May 2018. Check out our preparation checklist to make sure you're on track today!

Cloud Security Threats 2018
The onset of year 2018 has been a usual business for IT teams still struggling to find their way out in terms of strengthening their cloud security.
0
My Os is win 10 prof 64 bit and I recently underwent a hacking and I am uncertain if the hacker had left any malware to come to live whenever the pc is booted on.  Hope if the Experts please take a look at the list of processes that are running and flag for me any potential threat that is still running.  Thank u. regards
3-List-of-Processes-running.JPG
4-List-of-Processes-runniing.JPG
1-List-of-processes-running.JPG
2---List-of-Prtocesses-running.JPG
0
Server Name: Sharecenter
Server version: windows server 2008 r2 standard, not VM and doesn't have VM on the host
CPU: Intel XEON X64
Role: Only File service, NOT DC
User: member of local administrators and domain administrators group.

Failed task: Tried to download and install Windows update KB4056897, after installation completed, I restarted server. After reboot, system shows failed to install and do revert
Also tried to install KB4074598, also failed by same reason.
We have a domain DC, also 2008 R2. It successfully installed same patch.
 
I checked system event, shows following message. How can I install the update successfully?

EventData

  errorCode 0x80070005
  updateTitle Security Update for Windows (KB4074598)
  updateGuid {0DE7DDAE-363C-461C-BEF3-BC8823F8D3D6}
  updateRevisionNumber 501
0
I am working on creating a DLP policy that does the following:

1) Provides a Policy Tip when Outlook detects that an email has a SSN in it.
2) Allows the user to send the message, but sends them an email advising them that they violated a policy
3) Allows an automatic override if the user supplies a subject-line based encryption trigger (encryption provided by our email security provider.  Sits in front of O365)
4) Allows an automatic override if the user requests encryption using an Outlook plugin (the plugin adds a header to the message and the email security provider detects that and encrypts the message.

The problem I am having is that Office 365 Security and Compliance DLP Policies are rudimentary and don't appear to allow requirements 3 and 4.  Exchange Online's DLP Policies allow everything but requirement 2.

Does anyone have any ideas around this?  Does the newer Security and Compliance polices allow refining with Powershell?  Thinking that maybe the GUI is rudimentary, and maybe I can get them to do what I want if I set them up with PS.

I've been beating my head against the wall on this.  It doesn't help that MS's replication schedule is an unknown.  I have no idea when the changes I make get applied.

Thanks in advance.
0
Hi All,

I created a proxy class from a  wsdl DealSplits.asmx  .  I  am getting  below error when I invoke any method.   The endpoint is https.

Error Message
There was no endpoint listening at https://****/DealSplits.asmx that could accept the message. This is often caused by an incorrect address or SOAP action. See InnerException, if present, for more details.
****
The InnerException is  The remote server returned an error: (403) Forbidden.

 Looks like security tag error in the binding. I tried to change security Mode="None" and it did not work.

 <bindings>
      <basicHttpBinding>
        <binding name="ImportDealsplitsSoap" closeTimeout="00:01:00"
          openTimeout="00:01:00" receiveTimeout="00:10:00" sendTimeout="00:01:00"
          maxBufferPoolSize="5120000" maxBufferSize="5120000" maxReceivedMessageSize="5120000">
          <security mode="Tranport">
            <transport clientCredentialType="None" proxyCredentialType="None"
              realm="" />
          </security>
        </binding>
</bindings>
 <behaviors>
      <serviceBehaviors>
        <behavior>
          <dataContractSerializer maxItemsInObjectGraph="5124000"/>
          <serviceMetadata httpGetEnabled="True" httpsGetEnabled="true"/>
          <serviceDebug includeExceptionDetailInFaults="True"/>
        </behavior>
      </serviceBehaviors>
    </behaviors>
 <endpoint address="https://**/DealSplits.asmx"
        binding="basicHttpBinding" 

Open in new window

0
In our as400 hardening doc, we currently allow 3 concurrent sessions per userid but our HQ new generic security policy recommends 1 session per Id

Was told that a user will require to run different types of jobs concurrently and often the jobs can take a while to complete even in our upgraded faster system I os400 v7 r2

What’s the practices out there?

CIS does not publish any hardening guide for os400
0
what classes as an information asset above and beyond corporate information systems used by a organisations department? We need to do some mapping of business functions to assets which is easy enough for applications, but it would be what else would fall under the banner of information assets, e.g. shared drive on file server etc.
0
Hi All!

I need a suggestion, hope you people help me.
I have done CCNA,CCNP in Routing&Switching and Security now want to do CCIE  in Security but little confused about future because everything is moving into Cloud, so can you anyone suggest me doing CCIE will worth it or not? I heard that Cloud technology jobs have good packages Compare to Cisco platform.
0
CASB Solution
Data security in the cloud is very much like a security in an on-premises data center - only without costs for maintaining facilities and computer hardware.
0
KuppingerCole Reviews AlgoSec in Executive Report
KuppingerCole Reviews AlgoSec in Executive Report

Leading analyst firm, KuppingerCole reviews AlgoSec's Security Policy Management Solution, and the security challenges faced by companies today in their Executive View report.

I have a client that continues to get a popup on her desktop -
Red Screen, White Script with Windows logo from "Windows Technical Support" with a security alert indicating that there were issues with your computer and to call Microsoft at a number and not shut down your computer. Her computer freezes and she has to do a hard shutdown to use her computer again. She has not allowed anyone on her computer as she is aware that this is a scam.

She has the newest Windows 10 and this is a laptop.

She has Malwarebytes Pro along with Windows Defender. Malwarebytes has quarantined the PUP spigot.generic google chrome on three different occasion but it has not reappeared since major scans in early December. I ran the full gamut at the end of January after she got the Security alert popup once again.

The scans I have run...some multiple times
Malwarebytes, SUPERAnitSpyware, Rkill, AdwCleaner, JRT, RogueKiller, Hitman Pro, Eset, Emsisoft, Dr.Web Cureit and Sophos and finally CCleaner.

She received the popup again today simply working in an Excel Spreadsheet.

My thought is to do a Refresh...if not that a Clean install. What do you suggest?
Thanks,
Mags
0
Where is the PCI DSS compliance does it say I need to do regular internal scans of my network?
0
Getting these 2 errors from domain controllers - unsure what it is, i checked and none of these servers have expired certificates


The revocation function was unable to check revocation for the certificate.
ErrorCode 0x80092012


Certificate enrollment for Local system failed to enroll for a DomainController certificate with request ID 52690 from YDC2.domain.com\domain-YDC2-CA (The revocation function was unable to check revocation for the certificate. 0x80092012 (-2146885614 CRYPT_E_NO_REVOCATION_CHECK)).
0
I want to send signed mail but outlook 2016 didnt want to send
 An Error occurred in the underlying security system. The keyset is not defined.
0
1
I am building a server room, and I would like to have a least expensive camera system / monitoring in there. any recommendations as far as the camera etc.?
0
Looking for the security of a Web Application Firewall, with the least amount of work.

I have been told I needed a Web Application Firewall (WAF) and wonder if it's smarter to use a Web Cloud based WAF? It's for a .NET MVC App. running on IIS.

It sounds like it's a smart way to get security, without first needing to become an expert in it. And to know they are always on the lookout, making their system more secure, would let me rest easier.

Any good names you can recommend?

Also, how difficult is it to "build our own?" What kinds of customization capabilities would we lose, if we went with a Cloud based version?

How long might it take to deploy a cloud version of the WAF?

If I wanted to use AWS, for example, must I also host my website with AWS?

Thanks
0
vSphere 5.5 and vSAN 5.5 End of General Support Reminder
Dear Valued Customer,

We would like to remind you that the End of General Support (EOGS) for VMware vSphere® 5.5 and vSAN™ 5.5 is September 19, 2018.
•      To maintain your full level of Support and Subscription Services, VMware recommends upgrading to vSphere 6.5. Note that by upgrading to vSphere 6.5 you not only get all the latest capabilities of vSphere but also the latest vSAN release and capabilities.
•      vCloud Suite 5 and vSphere with Operations Management™ (vSOM) customers running vSphere 5.5 are also recommended to upgrade to vSphere 6.5.
For more information on the benefits of upgrading and how to upgrade, visit the VMware vSphere Upgrade Center. VMware has extended general support for vSphere 6.5 to a full five years from date of release, which will end on November 15, 2021.

If you require assistance upgrading to a newer version of vSphere, VMware's vSphere Upgrade Service is available. This service delivers a comprehensive guide to upgrading your virtual infrastructure including recommendations for planning and testing the upgrade, the actual upgrade itself, validation guidance, and rollback procedures. For more information, contact your VMware account team, VMware Partner, or visit VMware Professional Services.

If you are unable to upgrade from vSphere 5.5 before EOGS and are active on Support and Subscription Services, you may purchase Extended Support in one-year increments for up to two years …
0
Assessing Vulnerability from URL parameters

I am in the processing of helping secure a .NET website against URL hacking. So I have spent some time adding a whitelist of valid domains and sub-domains. But what about query parameters?

My instincts are to add a second whitelist of valid query string parameters, but does that do anything to protect me?

I suppose a determined hacker could, with time and experimentation, find a query string param that has some exploitation value.

What do you think?

My worry is that whitelist of query string params may be difficult to generate, as this website is quite large. And there is always a risk of rejecting a legitimate request. The query string exposure is about revealing key data in the URL, but I am asking whether there is value in asserting that each query string param is in a whitelist of such params?

So, this is a customer service versus hack risk, threat assessment. And if there is little or no measurable reduction in threat, then this parameter whitelist could cause more harm than good.

Thoughts?

Thanks.


Thanks.
0
Free Tool: Subnet Calculator
LVL 11
Free Tool: Subnet Calculator

The subnet calculator helps you design networks by taking an IP address and network mask and returning information such as network, broadcast address, and host range.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

Looking for Test URL's to try against my Anti-XSS code

Can you post some URL's or a link to a site where I can get dozens of various URL's that I can use to test against my Anti-XSS URL Hack code?

I need domains in the return URL, query string parameters, to see what my code can do.

Thanks
0
I need a decryptor for ransomware *.rapid.  This ransomware has manifested itself on administrative files for a school.  I don't know if anyone has been able to find a solution for this at this time.
0
Hi all, I have been supplying mostly small to medium sized companies with general tech support. Most sites have one or two servers, a few VM's etc. workstations up to about 25

These small companies don't have separate departments so I could never see the real need for implementing VLAN's for any real benefit, and hence my exposure to VLAN's is limited at best

Some of these businesses are growing and I am starting to think that VLAN's could provide better network optimization and security. Problem is cannot get my head around VLAN's

I apologize if this been brought up before but I have looked at some forums and videos but I am starting to feel like a real idiot for just not getting it.

I would be super grateful if someone could direct me to some decent resources  to read about getting started with VLAN understanding and maybe give some opinions on the following:

1) Are VLAN's really beneficial for small businesses with an average of 20 users?
2) How would devices on different VLAN's with different IP ranges interact (Printers on VLAN10, Servers on VLAN20, Users on VLAN30 etc.) and why would I want to separate users and servers on different VLAN's
3) All users in these small office environments all share the same printers and servers, as well as the same internet gateway (How would a VLAN with a different IP range communicate with the only firewall or printer on another etc.) Nothing very complicated

I know this is 101 stuff for the CCNA's so please be …
0
Hello,

I have configured Windows active directory  (2016)as follows:

3 domain controllers, Windows 2016 operating system in 3 different physical locations, communicating with each other via VPN tunnels.
Windows member servers who join the domain are either Windows 2008 , Windows 2012, or Windows 2016 server operating system.

There are on Windows 7 / 8/ 10 client operating systems joined to the domain, only Windows server operating systems currently (although it is possible that this can change, but not likely).

This is a secure environment, and none of the servers can access the internet.

The environment needs to be as secure as possible. Therefore port communication needs to be locked down.

Can someone assist and tell me the the following:

1. Incoming / outgoing ports required by the Domain Controllers so the can communicate with each other?

2. Incoming / outgoing ports required by the member servers and domain controllers  so they communicate with each other ? (Member servers do not require  communication between each other, only to DC's)

Firewall rules (which exist for all servers) are defined by incoming ports allowed and outgoing ports allowed. Each server in this environment needs to be defined this way.

Thanks in advance!
0
Very suspicious Windows Defender Scan.

I sent my Lenovo Desktop in for repair to Lenovo's Depot in Louisville, KY via FedEx.
I shipped it from Gunnison, CO on Tuesday, January 30th.
It was received in Louisville, KY on Friday, February 2nd stating it was on the vehicle for delivery.
It was received by Lenovo on Monday, February 5th.

This is were it gets strange. I received my computer back from Lenovo Monday, February 12th. Last night I was reviewing a Windows Defender scan and see it had quarantined Trojan:Win32/Fuerboos.B!cl 3 times on February 2nd. My computer should have been in a box with no electricity. How would Windows Defender be able to run a scan? The same Trojan was detected and quarantined on February 12th the day I reconnected it in my office.

WD Security Scan
Does anyone have any explanation for this?
Thanks,
Mags
0
Good Day,

I want to open up ports to my home network to run internal services but would like to put a filter so that only certain TCP-IP or Domains can use.

My router is a new ASUS and allows limited IP filtering but would like something better.

Does anyone know of a free/cheap solution to this? I run Linux and Windows systems and also a small VM server.
0

Security

24K

Solutions

24K

Contributors

Security is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide. Computer systems now include a very wide variety of "smart" devices, including smartphones, televisions and tiny devices as part of the Internet of Things -– and networks include not only the Internet and private data networks, but also Bluetooth, Wi-Fi and other wireless networks.