ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login
    1. Topics
    2. Tags
    3. security
    Log in to post
    • All categories
    • gjacobseG

      ERL and Layer Two processing

      Watching Ignoring Scheduled Pinned Locked Moved IT Discussion erl security l2tp vpn edgerouter lite edgerouter ubnt ubiquiti
      7
      0 Votes
      7 Posts
      2k Views
      scottalanmillerS

      @coliver said:

      Do VPN connections get created/torn down with every communication? Or are they persistent until the device disconnects?

      Normally neither. They are normally persistent until a certain amount of time, then they tear down when idle. Might be hours or days. That way they don't remain absolutely forever, but normally a very long time.

    • scottalanmillerS

      John Oliver on Encryption

      Watching Ignoring Scheduled Pinned Locked Moved IT Discussion apple security encryption john oliver
      20
      2 Votes
      20 Posts
      4k Views
      DustinB3403D

      That was a good show, really was.

      I should email that to everyone here.

    • mlnewsM

      Palo Alto Reports that Ransomware Found on OSX

      Watching Ignoring Scheduled Pinned Locked Moved News palo alto security ransomware cryptoware mac osx
      8
      2 Votes
      8 Posts
      2k Views
      BRRABillB

      @scottalanmiller said:

      FUD

      I'm sad to say I had to look this up, and it wasn't nearly what I thought it would be.

    • mlnewsM

      IRS Authentication System for Preventing Hacking Has Been Hacked

      Watching Ignoring Scheduled Pinned Locked Moved News irs security breach
      6
      5 Votes
      6 Posts
      1k Views
      scottalanmillerS

      @Dashrender said:

      @travisdh1 said:

      Just think, we have to deal with these incompetent people every year. Maybe @scottalanmiller got out at the right time?

      He still has to file though.

      Sadly

    • gjacobseG

      UBNT Forgot / Lost UserID Password

      Watching Ignoring Scheduled Pinned Locked Moved IT Discussion ubnt access point controller security password
      7
      2 Votes
      7 Posts
      2k Views
      DashrenderD

      OH - sigh!

      Yeah yeah - fine.

      UBTN is username cap sensitive...

    • gjacobseG

      AD Sync between two Sites

      Watching Ignoring Scheduled Pinned Locked Moved Solved IT Discussion server 2012 active directory security sync issues replication
      16
      3 Votes
      16 Posts
      3k Views
      gjacobseG

      @coliver said:

      repadmin /replicate DC1 DC2 dc=domain,dc=com

      So I have have limited success.. but success was made. I the user I created on the other end,.. is now on the local AD.

      I'll look at this more,.. but think it's otherwise solved.

    • scottalanmillerS

      Sample Working IPTables

      Watching Ignoring Scheduled Pinned Locked Moved IT Discussion iptables linux firewall security
      4
      2 Votes
      4 Posts
      1k Views
      scottalanmillerS

      @dafyre said:

      Scratch that... I was able to figure it out.

      The configuration that you posted by default denies everything but SSH.

      Thanks!

      Correct πŸ™‚

    • scottalanmillerS

      UNIX: The /etc/shadow File in Depth

      Watching Ignoring Scheduled Pinned Locked Moved IT Discussion sam linux administration unix shadow file security encryption authentication
      8
      3 Votes
      8 Posts
      4k Views
      scottalanmillerS

      @travisdh1 said in UNIX: The /etc/shadow File in Depth:

      @stacksofplates said in UNIX: The /etc/shadow File in Depth:

      @scottalanmiller said in UNIX: The /etc/shadow File in Depth:

      @travisdh1 said in UNIX: The /etc/shadow File in Depth:

      Man, I did just sneak in after /etc/shadow became standard in the 90s.

      I was just before it.

      I was way after.

      Is this where I yell "Get off my lawn you young whippersnapper!"?

      It's certainly where I do.

    • AmbarishrhA

      Linux user

      Watching Ignoring Scheduled Pinned Locked Moved IT Discussion linux security
      18
      2 Votes
      18 Posts
      2k Views
      scottalanmillerS

      @brianlittlejohn said:

      0_1455289532043_sandwich.png

      I'm sure this goes against every best practice, but when I'm doing a bunch of admin stuff i issue a sudo bash and open up a new bash shell with sudo privileges

      Not uncommon, and I do that a bit too (I use sudo -i su) but one of the good things about that is that it still tracks your user, it does not treat you as root for auditing.

    • S

      Disable Show Characters on Wireless Security for Windows 7

      Watching Ignoring Scheduled Pinned Locked Moved IT Discussion windows 7 security
      7
      0 Votes
      7 Posts
      2k Views
      scottalanmillerS

      @Breffni-Potter said:

      If you don't own the PC why do you have local admin.

      I think that you'll find that if you have the local admin... you do own the PC πŸ˜‰

    • M

      Examples of Malware My Clients Once Fell Victim to Include...

      Watching Ignoring Scheduled Pinned Locked Moved IT Discussion malware virus security
      4
      1 Votes
      4 Posts
      2k Views
      scottalanmillerS

      @Dashrender said:

      When I was first hanging my own shingle as an IT consultant we were suggesting to all of our clients that they should purchase and install AV everywhere.

      Even in the 1990s that was ridiculous. How does someone manage to get enough money to start a business or hire an IT consultant but doesn't have the brain power to use AV?

    • StrongBadS

      US DHS Compromised, FBI Might Be Next

      Watching Ignoring Scheduled Pinned Locked Moved News security
      5
      4 Votes
      5 Posts
      2k Views
      Reid CooperR

      @travisdh1 said:

      @johnhooks said:

      @travisdh1 said:

      #HelpDeskFail "β€œSo I called up, told them I was new and I didn't understand how to get past [the portal],” the hacker told Motherboard. β€œThey asked if I had a token code, I said no, they said β€˜that's fine β€” just use our one.’”"

      You mean they didn't crawl through the vents and hang from the ceiling over a pressure sensitive floor?

      You forgot the egregious body shots of a woman crawling though "laser" lights.

      Bright lasers, so that you can clearly see them and her, of course.

    • hobbit666H

      Securing Linux - CentOS7

      Watching Ignoring Scheduled Pinned Locked Moved IT Discussion centos 7 security
      33
      0 Votes
      33 Posts
      6k Views
      StrongBadS

      @scottalanmiller I almost never use them. A few service accounts and that's about it.

    • mlnewsM

      99 Million Brute Force Attemps on Alibaba Yields 21 Million Accounts

      Watching Ignoring Scheduled Pinned Locked Moved News alibaba security the register
      14
      3 Votes
      14 Posts
      2k Views
      StrongBadS

      Seems like maybe they should have noticed, but does not seem like the breach or issue was really all that big.

      Lots of fake reviews, probably not the biggest deal.

    • mlnewsM

      Talos Workstation Powered by the IBM Power8 Looks to Reinvent Hardware Security for End Users

      Watching Ignoring Scheduled Pinned Locked Moved News ibm talos power power8 security open source phoronix
      2
      1 Votes
      2 Posts
      1k Views
      mlnewsM

      It would not be unlikely for the power of this workstation to be comparable to more than the processing capabilities of a fully populated Proliant DL580 quad CPU Xeon server.

    • mlnewsM

      Large Increase in TeslaCrypt Infections from WordPress Sources

      Watching Ignoring Scheduled Pinned Locked Moved News security malware ransomware teslacrypt spiceworks knowbe4
      1
      2 Votes
      1 Posts
      878 Views
      No one has replied
    • RoopanKumarR

      File server got affected by .micro

      Watching Ignoring Scheduled Pinned Locked Moved IT Discussion teslacrypt ransomware malware security
      16
      1 Votes
      16 Posts
      4k Views
      RoopanKumarR

      @Reid-Cooper do have any documents for the steps to be taken or how this works. So i will recommended to download and check with it.

    • mlnewsM

      Getting Started with GPG Security on Fedora Linux

      Watching Ignoring Scheduled Pinned Locked Moved News fedora gpg security privacy fedora magazine linux open source
      3
      2 Votes
      3 Posts
      1k Views
      stacksofplatesS

      Here's a quick version.

      https://www.variantweb.net/blog/creating-a-gpg-key-on-fedora-22/

    • W

      OSSEC - Anyone tried it?

      Watching Ignoring Scheduled Pinned Locked Moved IT Discussion ossec ids security open source
      2
      1 Votes
      2 Posts
      1k Views
      travisdh1T

      I have it installed. Just dropped the forwarder on the firewall so far. So it alerts me whenever something gets by the first box.... no alerts so far (I'd knock on wood if I could.)

    • NicN

      Lenovo screws the pooch yet again on the security front

      Watching Ignoring Scheduled Pinned Locked Moved IT Discussion lenovo security password
      13
      8 Votes
      13 Posts
      3k Views
      Deleted74295D

      @Nic said:

      And if you have to, at the very least wipe the machine and start from scratch with your own image.

      Now, that used to work. πŸ™‚ Now it does not.

    • 1
    • 2
    • 17
    • 18
    • 19
    • 20
    • 21
    • 31
    • 32
    • 19 / 32