Security is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide. Computer systems now include a very wide variety of "smart" devices, including smartphones, televisions and tiny devices as part of the Internet of Things -– and networks include not only the Internet and private data networks, but also Bluetooth, Wi-Fi and other wireless networks.

Share tech news, updates, or what's on your mind.

Sign up to Post

I need to decide if I should hire a security expert to try and "break" my site.

I have the latest updates for WordPress and WooCommerce and host it at AWS as EC2.

Where kinds of security problems might I have?

I already changed the database username to no longer use "root".

Can you think of things I can do to nail down the site?

Is it worth having a security guy look at it?

What, When and Where - Security Threats from Q1
What, When and Where - Security Threats from Q1

Join Corey Nachreiner, CTO, and Marc Laliberte, Information Security Threat Analyst, on July 26th as they explore their key findings from the first quarter of 2017.

We are in need of setting up a certificate authority on our public-facing server to authenticate Adobe eSignatures that are compliant with 21 CFR Part 11. Our CEO investigated doing this with Verisign or similar, and it looks like it would be very expensive that way. Can this be done in a Windows Server environment? Thank you in advance.
Can we create group of endpoints and can we assign policies to that group in trend deep security?
Trying to find an official Microsoft product to hash an entire drive in MD5 or SHA256.

CertUtil only works for individual files.
Get-FileHash only works for individual files.

I need something for an entire drive or set of directories and files.
I have a schema (database) in MSSQL that is called PRODUCTION.  I also have security group setup in Active Directory called DB_USERS.  

I am having a problem with the syntax to grant the security group, (and all of the members of it), the rights of SELECT, INSERT, UPDATE, ALTER and DELETE to "all" of the tables inside of this DB.

Can someone provide me with a syntax SQL query command to do that, or alternatively, how I can do that through SSMS?   For some reason I am just not getting the syntax correct.

I tried the following script, and it creates everything, but it errors out on the last line when it comes to the GRANT command.

USE master;

The error I am getting is "unable to access schema PRODUCTION. It does not exist or you do not have permissions."

I am logged in as SA.

Thank you in advance,
Hi Experts,

I am installing new wireless equipment at a very small motel this week. They have AT&T business internet and just want to provide an SSID and password/key to guests to connect. No splash screen or anything like that. They were originally using Netgear signal boosters that you plug into wall outlets, but customers stole them.

I told them I would only use pro-level equipment, so I have ordered 2 UAP-AC-PROs and the Ubiquiti 8-port 60w PoE Switch for 12 rooms. Eight rooms are in a 2-floor building, four on each floor and the other building is just four rooms on a single floor. I plan to install one AP on the ceiling in room 3 (middle, bottom room) of each building, including the two floor building. The rooms are small so I think this will suffice.


Do I need to order a security device or new router? Can I use the AT&T provided router and connect it to the Ubiquiti PoE switch and configure the WAPs using the Ubiquiti controller software installed on the office PC? And will that software without a security device or new router be able to provide two SSIDs?

The owners are trying to save money (of course!) so I wanted to see if any other gear was necessary. It appears that the solution I've provided will do the trick, but it is not ideal security-wise. Any advice is appreciated!


I understand the exposure of having a public facing website with username root.

So, I have created a new username and changed my WordPress site to use that new username.

Shall I delete the "root" username?

I have a DVR system for my IP camera systems and I have a sonicwall firewall. I need to access my dvr through my public IP address while out of office. I did the following steps:

Creating the necessary Address Objects

step 1
Then I did

step 2

Creating the appropriate NAT Policies which can include Inbound, Outbound, and Loopback

Then I did

Step 3

Creating the necessary Firewall Access Rules

then Firewall.png

I did these steps and still cant access the DVR system when outside my network.
Hello All,

I am a little confused about the difference between payload and shellcode. As per Metasploit book, shellconde is a set of instructions used as a payload when exploitation occurs, so it is also a payload.

Can someone clarify these terms?

Thank you!
Is there any real benefit in setting a BIOS password on laptops/desktops to prevent your staff messing around with boot sequence if the disc drive is full disc encrypted (bitlocker)?

I have seen numerous boot discs and USB which can exports/crack or even reset local windows password hashes, and booting from linux type distro's  for unencrypted systems bypasses windows login so you could access any sensitive local information. But I am not sure if there is any benefit in doing so if the drive is encrypted, as a boot CD/USB wont be able to pull hashes/sensitive files until the C drive has booted and the encryption key entered to make the data accessible?

Are there any remaining risks with not BIOS password if the drive is encrypted, or any benefits still in setting a BIOS password?
U.S. Department of Agriculture and Acronis Access
U.S. Department of Agriculture and Acronis Access

With the new era of mobile computing, smartphones and tablets, wireless communications and cloud services, the USDA sought to take advantage of a mobilized workforce and the blurring lines between personal and corporate computing resources.


Could registering a Dll in the System User pose any  problems. I am asking because I am using a ActiveX component in my application which runs as a Service on Windows.

Hi Guys,

we had a computer deleted in AD by accident and now the PC comes up with the following error: the security database on the server does not have a computer account for this workstation trust relationship

i know that we can remove from domain and re-add and this should recreate the trust relationship however I do not know the local credentials!

is there a way round this in AD? i tried re-adding the PC into AD but this didn't work either?
Need a bit direction here

My client has started a project to apply 2-factor authentication to all of their systems that house PHI using the SSO feature of Azure AD. They are already in the testing phase for their cloud-based apps but need help with internal network shares. Client was advised by his Azure support contact that the network shares can be set up with 2 factor authentication using a combination of Azure Information Protection Services and RMS on the local servers. Ideally, they want it so that only the specific Network Shares that contain PHI would have this extra layer of security, and then lock down those shares to about five users. If that level of granularity is not possible or practical, then having 2fa when logging into Windows locally would suffice as well. They are also open to third-party options if they are better suited to tackle the on-prem Server environment.  

Can someone advise of a good approach to this scenario

Thank you so much
We have difficulties getting monthly downtimes from business & applications teams.

Beside using HA/clustering where we patch one side, swing over (incurring several seconds
or minutes of downtime) & patch the other side, what are the ways people deploy patches
with no or minimal downtime?

I guess Tandem's  Non-Stop Himalaya  could achieve this but what we have here are:
a) AS400 or OS/400 R7
b) Windows 2008 R2 & 2012
c) UNIXes (Solaris, AIX, RHEL)
d) Cisco switches/routers
e) Checkpoint & Juniper firewalls

What is TrendMicro's  virtual patching & does it help minimize downtime for patching?
     We use RealVNC to to monitor a couple of PCs that are at a remote location. We have never had a problem using it but since upgrading the firmware on our  Sonicwall NSA 220 the firewall now stops the connection with the following alert: IPS Prevention Alert: MISC RealVNC Authentication Bypass, SID: 5828, Priority: Medium. How can I stop the firewall from blocking these events?

Thank you
I am a Delphi Developer and I want to use  and ActiveX component (for Compression) in my application. Will this make my program more vulnerable to Virus attacks ? My program is a backup application that uses FTP and Sockets to transfer files and messages. My program has nothing to do with a Internet browser.
I want to make sure my MacBook is secure.  I have created a strong password for login/user account.  However, I know I have forgotten it before and have been able to go into Recovery and then Terminal and reset it.  This seems like pretty weak security.  Does anyone have a better solution to protect my data in case my MacBook is lost or stolen?
A customer of mine would like to fully license the Symantec Endpoint Protection 14 Trialware once the trial ends.

We would like to install the antivirus software on a Server 2012 R2 Datacenter server and on two Windows 10 64-bit OS computers.

How much will this cost?

Will it be less expensive to license this software through a third party vendor rather than Symantec?

This software has been downloaded and installed from these URLs:|pcrid|155284187497|pmt|b|plc||pdv|c
what is the best was to ensure that you get the correct component needed for a machine?

i typically need to replace or upgrade RAM, hard drives and display screens.

i have used for RAM and hard drives as the side has a scan feature but was told that isnt a great idea for security reasons.

i mainly work on windows machines (running win 10 pro) but also work on some imacs
What does it mean to be "Always On"?
What does it mean to be "Always On"?

Is your cloud always on? With an Always On cloud you won't have to worry about downtime for maintenance or software application code updates, ensuring that your bottom line isn't affected.

Our WAN consists of three sites, each of which has its own WSUS server running completely separately of each other.
The updates that get automatically approved are Critical, Definition & Security.
We get a report after each synchronise from each server with the updates that we manually have to approve.

If I reconfigure two of the servers to be in Replica Mode and downstream Servers, will any updates I manually approve on the Primary server automatically get approved on the two Replicas?
We are moving from Fireeye MTP  to another product, considering Lookout .

Anyone can point me to or share reviews on Lookout?

Also, what are the assessment criteria I have to look out for considering that
our corporate phones (mostly iOS currently) & iPad are managed by
MobileIron MDM?

Email to be used is MI's email+  (not the native built-in email client)
Is there any way to debug certificate authentication on the Cisco ACS? I'm wanting to verify with certainty that one certificate is being used and not another when auth succeeds. But when I run the radius report I don't see any mention of the certificate itself altho it notes X.509 authentication was used. Thank you.

Also is there a way to debug certificate auth on a Windows 7/10 system? Or on Mac?
Hi all,

Having being doing some extensive work around our public facing webservers we are now getting down to less known issues. Most of the work we have being doing was around Certificates and encrption. Following another recent scan we are still getting the saem result come up for most servers:

  • Strict-Transport-Security      
  • Content-Security-Policy      
  • Public-Key-Pins      
  • X-Frame-Options
  • X-XSS-Protection      
  • X-Content-Type-Options      
  • Referrer-Policy      

I have read a bit about them but its a bit over my head not having a web background. To mitigate these problems can someone tell me are these weaknesses linked to IIS or encryption. Knowing that would be a good start.
This question may not make sense at all but would like to still give it a go:

what are the risks our EMC VMAX SAN to ransomwares & how are the attacks/
infections likely to occur?

Our MS Exchange's huge partitions are on SAN as well as our servers' database
& applications partitions.  Our PCs/laptops don't use SAN.

I can see the largest malwares & ransomwares being blocked is via our emails
(in thousands or tens of thousands monthly) compared to only a hundred or
less being blocked by endpoint AV & proxy : so how is this translated to our SAN?

A very unique question from our management.

So how do we mitigate ransomwares risks to SAN?  Just by endpoint AV & our
email filtering (which we use Proofpoint which reported tons of ransomwares
& ransomware downloaders being blocked monthly)
hi guys

I am setting up a Excel password sheet that is protected with information regarding  our domain passwords and switches etc. With the issue of ransomware etc becoming a grander problem by the day, I am now being asked to not only create these protected password sheets on the network, but also in the cloud with providers like 'LastPass'.

Would you or have you done this and feel safe to put your passwords in a vault in the cloud?

Thanks for helping






Security is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide. Computer systems now include a very wide variety of "smart" devices, including smartphones, televisions and tiny devices as part of the Internet of Things -– and networks include not only the Internet and private data networks, but also Bluetooth, Wi-Fi and other wireless networks.