Security

26K

Solutions

25K

Contributors

Security is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide. Computer systems now include a very wide variety of "smart" devices, including smartphones, televisions and tiny devices as part of the Internet of Things -– and networks include not only the Internet and private data networks, but also Bluetooth, Wi-Fi and other wireless networks.

Share tech news, updates, or what's on your mind.

Sign up to Post

To make data more confidential it is needed to generate a watermark on a PDF file. So, read the blog and get the complete knowledge about PDF watermarking. Also, learn simple ways to insert watermark in PDF files.
1
Mark Zuckerberg fell quite far out of grace and an outraged public have manifestly quit Facebook encouraging others to do the same. But is it the answer?
0
Security on computers should be like an onion, with many layers that need to be peeled off one before the next. Read on to find out how to make your computer more secure.
2
Tutorial: In this part of my series, I'll be explaining how to set up an IMAP connection in Mailwasher and Outlook and also explain the differences of how Mailwasher handles POP and IMAP connections. Enjoy!
2

Expert Comment

by:Nick Bolton
Excellent, I think a lot of users get stuck on the email settings parts and what they mean, so this guide makes that a lot clearer.
1
LVL 29

Author Comment

by:Andrew Leniart
Thanks for your comments Nick and I'm glad you approve. I'm writing these articles so that people can learn to use the power of this tool and enjoy it's functionality just as I have been for so many years.

Regards, Andrew
0
An explanation of How the Recycle Bin works and how to configure it so that it works for you just as you want. Enjoy!
2

Expert Comment

by:Nick Bolton
Thanks again Andrew, you write so well!
1
LVL 29

Author Comment

by:Andrew Leniart
Thank you very much for the kind compliment Nick!

If you would be so kind as to endorse the article by clicking the thumbs up at the bottom of the article, (to the left of the word comment) I'd very much appreciate it :)

Part-4 of the series is almost written and will be published soon!

Best regards,

Andrew
0
Here is the list of top 3 best PDF Restriction Remover software with their key features and pros and cons. One can choose the specific PDF security remover program according to their need.
0
Technology has revolutionized how we create, share and comment on information. So does that mean that there are new ethical standards for information within the digital age? Read on to find out!
0
Part 2 of my series about Mailwasher Pro. Learn about what Mailwasher is and how to massage this tool to your own specifications with some powerful configuration options that many users overlook, and by doing so, you can, like me, enjoy a totally spam-free inbox. Enjoy...
2

Expert Comment

by:Nick Bolton
A great follow on from Part 1 on how to get the spam filters to work for you.
0
LVL 29

Author Comment

by:Andrew Leniart
A great follow on from Part 1 on how to get the spam filters to work for you.

Thanks for the kind comment Nick and once again, welcome to Experts Exchange! Watch out for Part-3, being written now and will soon be published.

Best...

Andrew Leniart
0
Mailwasher Pro by Firetrust is powerful anti-spam utility, ideal for managing both POP and IMAP connections. Read this series of articles to learn how to setup and take advantage of its great features!
2

Expert Comment

by:Nick Bolton
Great introduction to setting up and getting started with MailWasher Pro. Thanks Andrew!
1
LVL 29

Author Comment

by:Andrew Leniart
Great introduction to setting up and getting started with MailWasher Pro. Thanks Andrew!

Hi Nick and welcome to Experts Exchange! Thank you for your kind comment and also for endorsing the article with a thumbs up. That means a lot to me so much appreciated.
0
Leaving sensitive information (like passwords) in clear text scripts is never a good practice, though it's sometimes unavoidable. This set of VBScript functions can be used to obscure critical information making it at least a little more difficult for curious eyes (or worse) to see.
1
LVL 100

Author Comment

by:Lee W, MVP
0
LVL 68

Expert Comment

by:McKnife
Things that need elevation will not work that way unless UAC is off, or you use the built-in administrator, Lee, because for that account, UAC is off.  I wouldn't recommend to use it for this purpose for another reason: startup scripts or immediate tasks do the same much easier.
0
Remote Desktop Connections and VPN Connections Fail. Starting May 9, we received many reports of Remote Desktop connections failing globally. Users received error messages on authentication when they try to remote to machines or VPN. Here's the cause, symptoms and simple workaround.
0
As more and more organizations are pushing their operations to the cloud, it's vital that you understand how threats could compromise those operations. We will focus on the aspect of the cloud security computing threats and countermeasure.
8
LVL 19

Expert Comment

by:Edwin Hoffer
Nice piece of information contains in this article.

We have to know about the latest trends in IT before going to know about Cloud Security in details.

Visit some good article link:

https://www.experts-exchange.com/articles/31708/Current-IT-Trends-and-Cloud-Security-Threats-2018.html

https://www.experts-exchange.com/articles/31694/What-is-Cloud-Based-Security-What-are-its-Security-Controls.html
2
A conventional approach to security to just put in best of the breed security control is not enough. This will be a part of the series to get the RIGHT security in place and first off is to make sure proper risk assessment approach is adopted. Security need not be complex.
0
This is the conclusion of the review and tests for using two or more Password Managers so you don't need to rely on just one. This article describes the results of a lot of testing in different scenario's to reveal which ones best co-exist together. Enjoy...
2

Expert Comment

by:Otto Didact
Thank you, Andrew Leniart;

Parts 1 & 2 of both of these articles were excellent.  

I actually like the idea of being able to carry around or safely stash a flashdrive as a alternate vault for passwords.  Being able to plug a USB stick into Laptop`s USB port & gain access through whatever gateways, even without WiFi, Bluetooth, Ethernet cables, &/or cell service & unlimited data minutes for an Internet connection seems like a beneficial advantage to me.  I as yet have never used a password manager, though have been following reviews their use for several years now, but then have usually felt they fell short of being applicable to how I & my wife would use them.  I especially like your innovation in deciding to redundantly use two password managers together.  

I think your article was the first time that any reviewer mentioned being able to print or save all of one`s passwords as a PDF, though for the purpose of keeping it with my passport doesn`t seem like a good idea, but in a safe deposit box, or in an other such safe place does.  And so does saving it to a USB thumbdrive, to then be placed in a safe place or carried on one`s person as necessary.  Saving a copy to the cloud, where an operational version of one`s password manager exists at one`s beck & call, & for syncing different devices & browsers, seems unnecessary.  

I am still a bit consternated by them not working with Microsoft Edge (is this the fault of the password manager industry or that of Microsoft), & with them not being able to figure out how to autofill or sign in on some login situations.  The latter especially sounds like someone needs to assign some set of universal criteria for login methodology, for both the password managers & the password  requiring gateways to adhere to in order to operate efficiently together, for the sake & necessity of the users of password managers, & of the sites & applications that rightly require security precautions.
2
LVL 29

Author Comment

by:Andrew Leniart
Hi Otto,

Parts 1 & 2 of both of these articles were excellent.

Firstly, welcome to Experts Exchange and thank you for reading my articles and especially for your kind comment! I'd be grateful if you could take a moment to endorse the articles by clicking the thumbs-up icon right underneath the end of them :)

I actually like the idea of being able to carry around or safely stash a flashdrive as a alternate vault for passwords.  Being able to plug a USB stick into Laptop`s USB port & gain access through whatever gateways, even without WiFi, Bluetooth, Ethernet cables, &/or cell service & unlimited data minutes for an Internet connection seems like a beneficial advantage to me.

You're not the only one. Others have expressed the same desire, yet the password developers seem to continue heading in the direction of making your vault fully available to you in a browser on their website instead. RoboForm is a typical example that moved away and dropped support for exactly what you prefer doing. I see that as a huge responsibility on the developers part, so it's important to consider who you are going to trust with the storage of such sensitive information.

That said, the only way I can see of influencing password manager developers is to continue showing them there is still a need for this type of technology and function. Keep giving them feedback - if they get enough of it, they may just start to listen.

I as yet have never used a password manager, though have been following reviews their use for several years now, but then have usually felt they fell short of being applicable to how I & my wife would use them.

You make an interesting comment. Obviously, I'm one of those that always recommends the use of Password managers. In my field of work, far too often I see people using the same password on multiple websites (and confess I've been guilty of that myself at times) and still frequently see real-life examples of sensitive password information being stuck to monitors via sticky notes, in totally unsecured spreadsheets or on a piece of paper laying on a desk or in a drawer. I'm not just talking about your average home user here either. I support many Accounting and Legal Firms who I've still noticed doing things like that. Basic human nature tendencies kick in, regardless of educational and professional achievement levels.

Everyone has unique requirements, so I'd be genuinely interested to hear "how" the variety of password managers fell short for your particular circumstances?

I especially like your innovation in deciding to redundantly use two password managers together.

Thank you so much. I've actually been doing that for years because I could never find a single solution that wouldn't break for me under one circumstance or another when a website changed its login steps. The use of two solved that, but the trick was finding two that could work together in harmony and not constantly fight one another for control of logging me into the websites I was visiting, or password protected applications on my computer. Currently, Roboform and Avast play very well together, but if I had to make a choice between the two, then I would probably keep the Avast solution. Despite the lack of features that Roboform offers, it seems to handle changed login pages far more effortlessly.

I think your article was the first time that any reviewer mentioned being able to print or save all of one`s passwords as a PDF, though for the purpose of keeping it with my passport doesn`t seem like a good idea, but in a safe deposit box, or in an other such safe place does.

Indeed, and you make an excellent observation that I perhaps should have clarified on a bit more. I would certainly never encourage people to save to PDF or even print out their passwords, but there have been times when that's helped folks out of a  jam. The capability is actually there in just about every password application I've tried, but I don't tend to encourage its use except under specific scenarios that a client may explain to me that they have.

And so does saving it to a USB thumbdrive, to then be placed in a safe place or carried on one`s person as necessary.

I do hope you have that USB thumb drive encrypted with a nice strong password in the event you ever lost it though? :)

Saving a copy to the cloud, where an operational version of one`s password manager exists at one`s beck & call, & for syncing different devices & browsers, seems unnecessary.

This again falls back to personal requirements and circumstances I think. For me, the option is invaluable, because I have a couple of laptops that I use when I travel, sometimes need to access my bank using my phone, or a website on an Ipad when showing a demo of a proposed solution to a client. Everything is available to me, all the time. But in order to have that luxury, I must trust that both Roboform and Avast will keep all my information secure - per my earlier statement.

In circumstances where such functionality isn't needed, such as perhaps yours, there is no need to use it just because it's available. There are functions in my Password managers that I simply ignore because I have no use for them. In fact, if "you" don't need cloud access to synchronize different devices and browsers, then you are in a somewhat enviable position of taking advantage of the freely available versions of those tools, where Cloud Synchronization is often offered as a "paid" feature.

I am still a bit consternated by them not working with Microsoft Edge (is this the fault of the password manager industry or that of Microsoft), & with them not being able to figure out how to autofill or sign in on some login situations.

A combination of both is my understanding. To have an application available as a plug into Microsoft Edge, it has to be vetted and approved by Microsoft first. How much work and/or expense this involves on the part of the developers I couldn't guess. But I am confident in one thing - from the feedback I received from all the password manager developers that were included in this review, all will at some point be updated to support Microsoft Edge. They will be forced to as the popularity of Microsoft's latest browser grows, if they want to retain their current userbase, subscribers and gain new ones over other competitive offerings.

The latter especially sounds like someone needs to assign some set of universal criteria for login methodology, for both the password managers & the password  requiring gateways to adhere to in order to operate efficiently together, for the sake & necessity of the users of password managers, & of the sites & applications that rightly require security precautions.

I don't believe it's so much as how to fill in the required information or security precautions, which would be a given. It's more about getting their application approved as a plug-in for Microsoft Edge, and subsequently even approved to be available on the Microsoft Store, strongly promoted in Windows 10. Again, this falls into how much effort is required to get past that vetting process. As I'm not a developer, that's something I'm not very familiar with.

My thanks for all of your feedback and comments Otto!

Regards, Andrew
0
The intent of this article is not to tell you what solution to use (you know it better) or make a big bang change to your current regime (you are well aware of), but to share how the regime can be better and effective in streamlining the multiple patch implementation.
0
It has been a full year since one of the worst ransomware attacks we have seen, the Wannacry attack last year. The attacks have changed. The way we are addressing them has also changed, but maybe not enough.
4
LVL 33

Author Comment

by:Thomas Zucker-Scharff
Jan,

Thanks for pointing that out.  The page editor and i both missed it.
0
LVL 33

Author Comment

by:Thomas Zucker-Scharff
Thanks
0
In computing, Vulnerability assessment and penetration testing are used to assess systems in light of the organization's security posture, but they have different purposes.
6
A discussion about Penetration Testing and the Tools used to help achieve this important task.
0
An Incident response plan is an organized approach to addressing and managing an incident. The goal is to handle the situation in a way that limits damage and reduces recovery time and costs.
7
This tutorial shows a simple method of resetting a forgotten Windows 10 Password, on both a Physical and VM VirtualBox machine without the need for any third-party tools. Both Local and Microsoft Connected accounts are covered. Enjoy...
9
Cloud computing is a model of provisioning IT services. By combining many servers into one large pool and providing virtual machines from that resource pool, it provides IT services that let customers acquire resources at any time and get rid of them the instant they are no longer needed.
4
To share tips on how to stay ALERT and avoid being the next victim - at least not due to your own poor cyber habits and hygiene!
2
LVL 17

Expert Comment

by:Scott Silva
Good article, but maybe a bit of grammar polishing would make it better... It seems to drift from first person to third person and back, and for an old time technical proofreader like me, it just jumps out...  Not nit picking, but a lot of people might be reading it in the future...
0
LVL 72

Author Comment

by:btan
Thanks Scott for the comments, I have done some revision.
0
A basic introduction to Website Security and the absolute minimal steps that anyone should take in order to protect against hostile intrusions. This is offered as a guide to getting started, not an exhaustive list of all precautions. Enjoy...
4
A question that many companies need to answer until May 25th of 2018... Is your company ready for GDPR?
0
LVL 7

Expert Comment

by:Giuseppe 'Pino' De Francesco
Pseudonymisation is not encryption, is replacing real data with some artificial value that the system is capable of then use to retrieve the actual data. Encryption is separately mentioned in the GDPRm so they are both necessary and independently implemented, depending on the data model that needs to become GDPR compliant.
0
LVL 25

Author Comment

by:Luciano Patrão
Hi Giuseppe,

Yes you are correct. I must say that I may misused the word "encryption" in this section here to explain pseudonymisation.

So I change the text so that is more clear what is pseudonymisation.

Thank You for your comment.

Luciano Patrao
1
You do not need to be a security expert to make the RIGHT security. You just need some 3D guidance, to help lay out an action plan to secure your business operations. It does not happen overnight. You just need to start now and do the first thing right!
1
LVL 33

Expert Comment

by:Thomas Zucker-Scharff
Btan,

Exvellent, succint article! Thanks!
0
LVL 72

Author Comment

by:btan
Thomas, thanks for the compliments. Much appreciated.
0

Security

26K

Solutions

25K

Contributors

Security is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide. Computer systems now include a very wide variety of "smart" devices, including smartphones, televisions and tiny devices as part of the Internet of Things -– and networks include not only the Internet and private data networks, but also Bluetooth, Wi-Fi and other wireless networks.