Search:
Type: Posts; User: alanmott; Keyword(s):
Search:
Search took 0.02 seconds; generated 59 minute(s) ago.
-
April 4th, 2006, 10:49 AM
Hi all,
Found a link to this paper on the SecurityFocus website. Definitely worth a read. In short, it concludes that browser design needs significantly revamping to help users determine when they...
-
April 3rd, 2006, 04:05 PM
Thanks people. The comments posted thus far are things I've already considered. My feeling is that i'll allow the filetypes internally, but block them them externally (e.g. block them from the...
-
April 3rd, 2006, 10:24 AM
Hi all,
Does anyone know of any security issues with Macromedia Shockwave, both from the persepective of the browser plugin and the contents of the filetype itself? I have a request from our user...
-
As you are conducting an investigation, you should really image the HDD using a forensics tool like EnCase or Vogon, and analyse the data from the image, not from the original HDD. Otherwise your...
-
September 3rd, 2004, 10:18 AM
Try booting into SAFE mode and deleting the unwanted exe.
-
July 23rd, 2004, 04:04 PM
Hi,
First off, I'd like to express my support for your attempt to get "user buy-in" to IT security by educating them. It pays dividends, and I speak from experience. I'll quote you an example. In...
-
Hi all,
Just to add to the debate, I'll give you my organisations view of this matter. Hopefully it'll fuel the discussion surrounding Negative's comments.
In our organisation (as I guess in...
-
Hello all,
In this particular scenario, I can't see any added benefit to having the link between CAPTAIN and GRUNT encrypted. Before accessing CAPTAIN, a hacker would first have to have control,...
-
Hi all,
These are known as Nigerian 419 Scams. Nigerian, because they first originated in Nigeria, and 419 because that is the element of the Nigerian penal code that forbids this type of...
-
April 13th, 2004, 09:18 AM
Tedob1 is right. If you need help from this thread then we need lots more detail on the topology of the network and how it connects to other systems, such as the Internet. But for you, the first...
-
April 7th, 2004, 01:01 PM
This seems like a very cunning ploy. As a matter of interest, what was the nature of the attachment that was referenced by the CID?
-
February 4th, 2004, 04:56 PM
Hi all,
I have a Win2K box at home, with seperate accounts for the three of us living there. However, one user (a teenager...groan!) has downloaded Kazaa.
I'd like to stop Kazaa loading at...
-
January 6th, 2004, 10:16 AM
Many thanks for your replies people, they've helped greatly. However I am concerned that the use of these two accounts is not only badly documented by M$, but the accounts themselves are hidden. The...
-
January 5th, 2004, 05:08 PM
I have Norton's Security Suite installed for both AV and Firewall.
My real reason for posting this query is that it appears to be "feature" of XP that I cannot find any reference to on the web,...
-
January 5th, 2004, 04:47 PM
Hi all,
I've just installed Windows XP Professional on my laptop. At the command prompt, if I type in the NET USERS command XP reports the existance of two accounts that are not of my making. They...
-
December 22nd, 2003, 11:09 AM
Following on from the advice above, we too only allow access to the network if employees sign up to our Security Policies document. In the first instance, a username and pasword is not supplied by...
-
October 3rd, 2003, 02:58 PM
Hi all,
I'm interested in the forums views on where the Security Boundary exists in MS Windows Active Directory.
MS assert that this exists at the Forest level, as this is the only point at...
-
September 5th, 2003, 12:00 PM
In response to your questions,
For a start, Im running NT4.
I cant set up a trust to the original domain because my test server is not part of our global production network. I'm not in the...
-
September 5th, 2003, 09:02 AM
Hi all,
I have a problem investigating an IT security breach in my organisation. I have restored the shared folder area of a file and print server on our network to a test server such that I can...
-
August 26th, 2003, 09:14 AM
I think we need to be clear about the threat here. The title of the thread is "First Wirelesss Virus".
This is a misnomer, however. The virus referred to doesn't target wireless networks, it...
-
August 21st, 2003, 04:32 PM
Hi all,
Can anyone tell me exactly what happens when a PC's BIOS tests RAM? Does the POST merely identify how much RAM is present, or does it do a read/write test to each memory location in order...
-
Hi all,
As you may all be aware, MS Word stores a lot of hidden information in saved documents that details a number of things about that document. Such information includes paragraph formatting...
-
June 17th, 2003, 01:35 PM
To answer the original query, HTW files are part of the Index Server service that comes bundled with IIS. This service allows you to build a search engine on your web site.
As the SysAdmin of an...
-
I think all bases have been covered by this thread, and the articles listed. I would like to add one thing though - and thats why ADSs exist in the first place.
ADS is supported by NTFS for...
-
I've also heard that OWA is reasonably OK provided you lock down Exchange and the OS in the usual way.
Has anyone any experience in using OWA via SSL to give limited privacy protection when...
|
|