Security is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide. Computer systems now include a very wide variety of "smart" devices, including smartphones, televisions and tiny devices as part of the Internet of Things -– and networks include not only the Internet and private data networks, but also Bluetooth, Wi-Fi and other wireless networks.

Share tech news, updates, or what's on your mind.

Sign up to Post


This may sound a bit crazy, but is there a way to protect sensitive data from programmers while there are developing the application? (sounds crazy because the programmers has to see the data).  For example,  we are compiling social data of staff like family components, relationships, members income, health issues, etc.  Management want to protect the data from IT support techs that will support this apps and from programmers that will be developing the apps.  If there is no way, and IT has to see all the data, what can a company do to manage this situation where very sensitive data is projected to in the system?

What we have come up with is using dumb data (not real data) for developers to create the applications.  We will use this data from creation up to validation stage.  In data import, the tech responsible has to see this data (so here must be some sort signed agreement) in the support stage since the tech has to see the problem, they have to see data but will not have a test environment with real data.

What u guys think? - any Experts with this type of experience fully appreciated you input

When using Office 365 in the Web, what collaborations and security features can I have?  

For example, I want to create an Excel on the web and set it up to have ,
  • I am the author
  • I am the only one to delete the Excel
  • limit to 4 collaborators to use at one time
  • 3 users cab edit the document, 1 only view
  • assign restriction as to which user can edit which worksheet within the Excel

Finally, can I create Pivot, Graphs, Filters, etc. like a Desktop Excel on a web Office 365 excel?
I went to extensions ( not add-ons) in Google settings and also to my control panel and programs. I saw nothing to identify these lower right hand corner popup ads. I used Malwarebytes and it found nothing and Trend micro finds nothing, I cleared all chrome data. These ads were x rated and now not so.
Within the ad you see: Google Chrome -
Is there a setting in Chrome to stop these or should I remove Chrome? I do see a option in the settings to restore Chrome to the default.
This started early yesterday and never before. When they pop up which is every 5-10 minutes, if I ignore them they close. When they re-appear an annoying sound.
Close does nothing and open just opens another window to some site,

When trying to install a Windows application using Clickonce technology, I receive the following error message in detail section of failed installation:

"Deployment and application do not have matching security zones"

How do I fix this error?

MS-ACCESS Application Security.
Hi, I need a compilation of security measurements to put in a ms-access application.  Such as:
1. Users cannot see tables.
2. Users cannot see vba code.
3. Users cannot use Special keys : Keys such as Ctrl+Break, Ctrl+G, and the Shift key to bypass startup options in the database.
4. Users cannot see the Navigation panel at all.
5. Users cannot see any forms, queries, reports or any other object.
6. Any additional suggested.

Please advice.

Thank you.
we are getting security warnings prompts in outlook for add-ins.

wanted to know i s it related to macro settings with outlook.

i see following settings enabled in outlook- apply macro settings to installed add-ins

can this be the cause or any other reason,
i was also referring to this article.

the values are 0-3  , none of which are prompt. Can we find a way to use prompt.
I have a Certificate that I am trying to install on IIS Windows Server 2012 R2. The certificate file is a CRT.
I have tried a number of methods including:

  • Convert the CRT to CER on the server I want to install on.
  • Choosing "Complete certificate request" on the IIS / Server Certificates dialog.
  • Select the CER file, and  choose
  • Web Hosting
  • for the store.

This ultimately give me a "Failed to remove certificate" message.

If I choose "Personal" for the store, it will import, but then the certificate does not show in the list for binding to the web site.

I have Googled a lot of posts regarding this, but have not been able to resolve this issue.

I am hoping  to get some advice to be able to install this cert properly.
Hello All,
I have a question about SSO (Single Sign-On).
There is a website that offers a service and in order to use their service they used to require knowing what our IP address was in order to control access to their services by IP. Now they are changing to SSO instead and even though I'm not familiar w/ SSO I know that they would need to connect to our AD for authentication and as we know a lot of breaches happen with Third party companies having access to internal network infrastructure. I don't feel comfortable using this method and since I'm not all that familiar with it I figured I'd ask your opinion. Yes, I do know that NOTHING is 100% secured and full proof but I want to at least make sure that I'm not potentially opening a can of worms.

My questions are:

- What are some of the risks if I chose to give their SSO access to our AD?
-If I decide to go w/ the SSO what are the questions I should be asking them to make sure that they have their "sh#*" together and will not potentially compromise our Server/network.
-What are some of your opinions on going w/ SSO from a Third party vendor?
-Should I implement SSO in this case or hold my ground and ask for another solution?
-Could I use AWS, Azure AD (or similar) to create just a stand alone AD on it's own to use with this service and is is cost prohibitive?

Thanks in advance for all your help, it's greatly appreciated!!
how to block phpmyadmin page to be accessible from external ip
What command can i use from mac terminal to determine the version of phpMYAdmin running on an IP address
What command can i use on a mac terminal to know the version of nginx running on a remote IP address?
How to identify possible virtual host on a network using IP address. I have the ip address but i don't know how to go any further
I'm having a security problem involving Windows Offline Files.  I'm using Offline Files in Windows 10 with files located on a server that is running Windows Storage Server 2008 R2.  When connected to the network, my account has no problem accessing files located in appropriate shares on the server.  But when my computer is offline, I am unable to access any files that I have not previously accessed on the server while connected online, and receive "Access Denied" messages.  The folders that I need to access contain literally millions of files, so I cannot simply take the time to access each of those files in advance while connected online, just so that I will later have the ability to access those same files offline.

Note that I suspect this issue could be related to some recent changed permissions on the server.  Here is the relevant setup for one of the accounts with this problem:
On the laptop, there is a local user named Kevin, with a certain password.
On the server, there is an identical user named Kevin with the same password, and that user is a member of the group KAM-BTM.
On the server, the group KAM-BTM has Modify, Read & Execute, Read, and Write permissions on the share containing the files that are exhibiting this problem.
On the server, all subfolders and files beneath the top level share inherit their permissions from the share.

It seems as though the laptop may have cached some obsolete permissions from the server, and the only way those obsolete …

I do have a video that is in a .MOV format and the size is 9MB . I have been requested to  password protect the video.
This video will be sent to a another organisation through an email.

Please let me know how to password protect the video file.

Any help will be great.
Hi Experts!

Being overly cautious here and wanted your opinion.  I received the following (ransom) email below and thought it was suspicious. From what I can find on the web this looks like a phishing attempt (somehow gotten a hold of my email and old password from somewhere). On my desktops and laptops we have the paid versions of Avast Premium Security and MalwareBytes. Both are scheduled to run daily, and Windows Update is always on. We primarily use Google and that self-update. My email account has MFA enabled for awhile; so I know this person cannot access my email?

 After getting the email I manually scanned the desktops and laptops with Avast and MalwareBytes. Nothing found. Downloaded and ran Spybot seach and destroy and nothing bad found.

My thought that this is a phishing attempt is because if you have control over my computer when don't you lock it and demand payment instead of this email?

Here's the email:

Recorded You <>

Nov 18 at 1:30 AM

Hey, I know your password is: HeknowsMyPassword

Your computer was infected with my malware, RAT (Remote Administration Tool), your browser wasn't updated / patched, in such case it's enough to just visit some website where my iframe is placed to get automatically infected, if you want to find out more - Google: "Drive-by exploit".

My malware gave me
We have a Lenovo laptop with Windows 8. It's only used for travel and that was back in May. Periodically we use it at home to keep it charged, etc. Today as we prepare for travel Windows said our password had expired.

How long are passwords good since we logged in about 45 days ago with no issue.

Then when we try to create a new password it asked for our user name.

Where in the settings can we find our user name?

I guessed 3 times and failed and somehow by clicking ok or cancel or the user icon on the middle of the page, finally got to a place to enter a new password and we in that way.
I'd like to obtain the ISO 27001 certification.  From my understanding this is an intermediate level security/audit certification.  Where exactly does one start?  For example training resources; who offers or sponsors this certification; it's costs, etc.  Any input towards this is greatly appreciated.  Thank you!
Hello! I have old security groups in Exchange 2016 on-premise that have existed from previous version of Exchange. I want to delete them. However I get this error when I try and cannot find a solution anywhere:

Property IsExecutingUserGroupOwner can't be set on this object because it requires the object to have version 0.10 ( or later. The object's current version is 0.0 (6.5.6500.0).

Any advice?
I am looking for a web page that lists Azure compliance with various security standards.

This is  that page in Amazon AWS:

Is there something similar for Azure that anyone knows of?

I have a computer with 2 hard drives, the OS hard drive C: and a file container hard drive D:

It seems that no matter what procedure I try on the D: drive to set Security, I end up when it propagates permissions I get:
Failed to enumerate objects in the container. Access is denied.

The approach that seems to be recommended most often is changing the ownership to the current user and propagating the result.

I still get:

An error occurred while applying security information :
Failed to enumerate objects in the container.  Access is denied.
[CONTINUE] and on to the next folder with the same message.

It appears that I've been able to get file access down ONE level in the folders and no more.

There's a lot of data (and folders) on this drive and I'd like to propagate an effective cleanup of Security permissions.

Is there a way?
I am looking for best options for SMTP relay/Secure Email Gateway to be implemented in our environment.

We already are using O365 and we have IBM domino with Postfix as MTA and I am looking to replace both with a product that will server an SMTp email relay with security features as in junk filtering, user validation etc...

Let me know who are the best players in market.
"Forwarded" domain unreachable. Users get "Page Can't Be Displayed" when trying to access website forwarded using GoDaddy to another domain. forward is a "permanent (301)" and set for "forward only" (No Masking). SonicWALL firewall with all Security Services disabled still cannot access. Other sites with similar FW can access site successfully.
I logged into my gmail account with my correct email address.
I typed my correct email password!
I got the "doesn't recognize this device message" message.
Gmail wanted to verify my account using a phone number which I don't have any more.
I clicked to "send verification code to my email account".
I received the email verification code and correctly entered it.
Gmail said "Thank you for confirming" BUT STILL DIDN'T LET ME INTO MY ACCOUNT!
(See graphic).
HELP.  How do I get into my account. Is there a help desk? or help email or help "chatline" I can  go to.

Latest Windows Security Patch Crashes Microsoft Access 2013/2016 applications with "The OpenForm action was canceled". This started happening Nov 12 2019. I have had at least 14 client computers over the last 2 days call with this issue. So far my only solution has been to do a system restore and pause their Windows updates for the time being.
It also appears that customers with Windows 1809, end of Service was scheduled for Nov 12 2019. and apparently some older Home versions would not allow you to pause updates.
I found an article that suggested that registry settings for MSCOMCTL.OCX are messed up by the update with recommendation to unregister and re-register the control:
using Windows Power Shell:  regsvr32 -u "C:\Windows\SysWOW64\MSCOMCTL.OCX"   and then  regsvr32 "C:\Windows\SysWOW64\MSCOMCTL.OCX"
Although the commands are successful, that does not solve my problem. This problem is occurring for both Windows 10 and Windows 7 computers (I would assume 8.1 as well)
Toshiba satellite laptop, and unfortunately it has a password to log in and it was given to me by a relative who passed away.
Any way into it?






Security is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide. Computer systems now include a very wide variety of "smart" devices, including smartphones, televisions and tiny devices as part of the Internet of Things -– and networks include not only the Internet and private data networks, but also Bluetooth, Wi-Fi and other wireless networks.