Security

22K

Solutions

129

Articles & Videos

21K

Contributors

Security is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide. Computer systems now include a very wide variety of "smart" devices, including smartphones, televisions and tiny devices as part of the Internet of Things -– and networks include not only the Internet and private data networks, but also Bluetooth, Wi-Fi and other wireless networks.

Refine results

Knowing where your website is hosted is as important as the features you receive, the monthly fee, and the support you receive. Due diligence should be done when choosing your next hosting provider.

05 views
Gigs: Get Your Project Delivered by an Expert
Gigs: Get Your Project Delivered by an Expert

Select from freelancers specializing in everything from database administration to programming, who have proven themselves as experts in their field. Hire the best, collaborate easily, pay securely and get projects done right.

Please recommend a good scanner that will scan an IP address and the device connected to it for vulnerabilities.  The network passed all of the free scanning tests off by expert exchange.

622 views

How do I Prohibit execution of files (EXE, VBS etc.) from folders such as AppData, User’s Temp in Windows.

617 views
Phishing Awareness Training

Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers.

According to a report by Verizon, only 3% of targeted users …

04 views
Secure Portal Encryption

With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name …

02 views
PDF Encrypted Email

The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The …

00 views

I have a customer who has a small Server 2012 network. 8 workstations and one wireless AP (for computers on his domain). Their internet is Cable. Comes in to a SonicWall TZ100.

   What is the most…

630 views

Data breaches are on the rise, and companies are preparing by boosting their cybersecurity budgets. According to the Cybersecurity Market Report …

017 views

Hello,

I find myself in a scenario where I am responsible for upgrading BIOS / EUFI remotely, quickly, and at scale, if a potential security vulnerability occurs.

We do no have standardized …

432 views

I've got a network that has had large numbers of shared folders, security entries etc and users assigned rather than groups.  Turn over of users have left SIDs in these shared folders/security.  I …

318 views
Backup Your Microsoft Windows Server®
Backup Your Microsoft Windows Server®

Backup all your Microsoft Windows Server – on-premises, in remote locations, in private and hybrid clouds. Your entire Windows Server will be backed up in one easy step with patented, block-level disk imaging. We achieve RTOs (recovery time objectives) as low as 15 seconds.

Hi experts,
I need to get the value on asp at the server side and bring it back to my html or make it in public declaration whether the value is True or False.  For example “var Allow”, my problem is…

1519 views

hi .
in active directory we have 2 type group
1.security group
2.distribution group
why though security group  we use distribution group ??
and what is ticket bloat?
thank you so much

325 views

Hello,

On domain controllers (Mostly server 2008 R2 and some server 2012 R2) when a non-domain members attempts to connect to the DC they are prompted for their network credentials.  Which keeps …

1837 views

Hi,


I need to setup static routes

i basically want to

destination 8.8.8.8  -->  169.38.73.5

destination 8.8.4.4 --> 195.28.181.161



basically so 8.8.8.8 is translated to …

431 views

Are there any checklists that can be used for a desktop security assessment (windows 7). We have a fresh built device which should represent the standard built assigned to all end users and want to …

224 views

what kind of things do you need to consider in terms of network level permissions when deciding what account to associate with the sql server services? it is not part of a cluster if that affects …

420 views

Dear
I have 5 servers infected with .wallet virus wich encrypted all system files , and files on these servers as per attached , how i can reomve this , these servers using kaspersky endpoint …

872 views

Is it possible to allow somebody to view a Facebook profile without making it public?

My family have various personal Facebook profiles; myself, my sons, my brother and his wife, their children, …

919 views

Hi,
We are considering Sophos Intercept X and Endpoint Security for our organization. I was wondering of anyone has had any experience with this product. If so, how is it working out for you.

220 views
Live: Real-Time Solutions, Start Here
Live: Real-Time Solutions, Start Here

Receive instant 1:1 support from technology experts, using our real-time conversation and whiteboard interface. Your first 5 minutes are always free.

Last night, a user was locked out of our Active Directory domain. I unlocked him a few minutes later and all was well. However, I am having trouble finding why he was locked out. I see 1 entry in the …

727 views

Hi

We have recently started getting thousands of failed logons against our DC's from our Office 365 (DirSync) Server. The server itself is running 2012 Standard.

I can't seem to track down much…

324 views

I have an MS Winforms application with a winform using the embedded WebControl.   It is running in .NET 4.0.  I would like to suppress all popups. Security Alerts, Javascript errors, etc...

Tried …

125 views

Smartsheet (a project management web service) has a "Log in with Google" feature.

It works even when I am not logged into Google.

1. How does that work (even when I am not logged into Google)?

525 views

I'm downsizing my office and operations. Currently I'm using MS windows server and active directory. I would like to abandon having MS networking services and management for something that won't be so…

935 views

Is adding the user with full permissions to the workstation security properties (see attachment). Essentially the same as giving the user local admin rights? Will it allow the user to install and …

331 views
Show more content
201506-LO-Top-001

Vendor Experts

Western DigitalWestern Digital
Contact
Learn more about Western Digital

TOP EXPERTS

view all

RELATED TOPICS view all topics

  1. OS Security
    (21,511)
  2. Software Firewalls
    (19,720)
  3. Encryption
    (6,926)
  4. Anti-Virus Apps
    (22,171)
  5. Vulnerabilities
    (6,609)
  6. Network Security
    (6,286)
  7. Networking
    (89,662)
  8. Active Directory
    (73,213)
  9. Windows Server 2003
    (128,563)
  10. IPsec
    (5,864)