ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login
    1. Topics
    2. Tags
    3. security
    Log in to post
    • All categories
    • scottalanmillerS

      Tox Secure IM

      News
      • instant messaging security tox • • scottalanmiller
      6
      0
      Votes
      6
      Posts
      1.8k
      Views

      StrongBadS

      Does not really sound all that interesting. Maybe once it is released it will do something that we haven't foreseen.

    • scottalanmillerS

      Microsoft Settles with NoIP

      News
      • microsoft noip dns security malware • • scottalanmiller
      8
      2
      Votes
      8
      Posts
      2.1k
      Views

      thanksajdotcomT

      @MattKing said:

      @ajstringham I'll see myself out.

      😛

    • AmbarishrhA

      SSH With Two-Factor Authentication- What do you think?

      IT Discussion
      • security • • Ambarishrh
      6
      1
      Votes
      6
      Posts
      762
      Views

      scottalanmillerS

      Wait until you do scripting from a jump box. So slick.

      for i in $(cat serverlist); do ssh -qt $i uptime; done

    • scottalanmillerS

      NSA Spies 90% on Innocent US Citizens

      News
      • security nsa • • scottalanmiller
      3
      0
      Votes
      3
      Posts
      1.0k
      Views

      DashrenderD

      Certainly not.

    • scottalanmillerS

      Tonight's Project: Ubiquiti Router for Home

      IT Discussion
      • ubiquiti firewall security router networking • • scottalanmiller
      35
      0
      Votes
      35
      Posts
      7.5k
      Views

      scottalanmillerS

      @thecreativeone91 said:

      Untangle is a major resource hog from what I remember.

      It is. It isn't routing or switching software, it's just Linux as a full OS with tons of apps running on it. So unlike, say, Vyatta which powers the Ubiquiti which is based on Linux but is extremely light and fast because it is a custom kernel with a custom network stack just for routing, Untangle is the full blow OS with nothing special. So you need tons of horsepower to handle normal routing tasks effectively.

    • scottalanmillerS

      InfoWorld's Five Summer Scams

      News
      • security • • scottalanmiller
      1
      0
      Votes
      1
      Posts
      465
      Views

      No one has replied

    • scottalanmillerS

      Government Approval Needed for Encrypting Email

      IT Discussion
      • security • • scottalanmiller
      6
      0
      Votes
      6
      Posts
      1.5k
      Views

      scottalanmillerS

      There is a big difference between exporting cryptography and exporting something encrypted, though.

    • scottalanmillerS

      Microsoft Boosts Anti-Snooping Protection in OneDrive

      News
      • microsoft security onedrive • • scottalanmiller
      1
      2
      Votes
      1
      Posts
      907
      Views

      No one has replied

    • scottalanmillerS

      TrueCrypt Audit Status

      IT Discussion
      • truecrypt open source security • • scottalanmiller
      6
      1
      Votes
      6
      Posts
      1.4k
      Views

      scottalanmillerS

      @alexntg said:

      @Dashrender said:

      I know it's still useful for Linux, but really - is that enough reason to go forward with this audit?

      Perhaps? Perhaps not? If someone's still paying the auditor, I'm sure they'll keep on auditing.

      The audit is very important. TC remains a very viable product. Moreso than ever having weathered this storm.

    • AmbarishrhA

      chromebleed

      IT Discussion
      • heartbleed security • • Ambarishrh
      2
      0
      Votes
      2
      Posts
      886
      Views

      scottalanmillerS

      Oh handy, thanks.

    • scottalanmillerS

      Google DDoS Protection

      News
      • google ddod security networking denial of service • • scottalanmiller
      4
      1
      Votes
      4
      Posts
      1.3k
      Views

      scottalanmillerS

      @Bill-Kindle said:

      very interesting. My only concern is with continuous development, will they keep the product / service updated if it goes live?

      It's google. So not likely.

    • scottalanmillerS

      Cisco Open Sourcing New Encryption

      News
      • cisco open source cipher security encryption • • scottalanmiller
      1
      0
      Votes
      1
      Posts
      859
      Views

      No one has replied

    • scottalanmillerS

      Ancestry.com Offline

      News
      • security • • scottalanmiller
      2
      0
      Votes
      2
      Posts
      551
      Views

      NicN

      That website is
      (••)
      ( ••)>⌐■-■
      (⌐■_■)
      a ghost of it's former self

      YEEEEAAAAAAAAAAAAAAHHHHHHHHHHHHHH!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

    • scottalanmillerS

      SuperMicro Servers Exposing IPMI Password

      News
      • breach supermicro security • • scottalanmiller
      3
      0
      Votes
      3
      Posts
      2.1k
      Views

      alexntgA

      As an update, CERT even put out an advisory to have folks not expose their management interface: http://www.us-cert.gov/ncas/alerts/TA13-207A. I'd like to suggest taking it a step further. Other management interfaces, such as hypervisors, web control panels, SSH logins, etc. should not be exposed to the Internet.

    • scottalanmillerS

      Code Spaces Closes Its Doors After Hackers Delete All Data

      News
      • security • • scottalanmiller
      13
      0
      Votes
      13
      Posts
      1.9k
      Views

      alexntgA

      @Bill-Kindle said:

      @scottalanmiller said:

      @alexntg no kidding. No backups? That's crazy.

      But Cloud........

      Not having backups leaves them liable for some massive lawsuits. I'd be really surprised if they ever come back. Titsup was a good word for what happened to them.

      They did have backups. They were also in AWS and geographically redundant. The attacker deleted the backups as well. The issue is that a proper DR plan would have addressed the issue of what would happen if AWS failed.

    • scottalanmillerS

      Most Brazen Back Door Attempts in History

      News
      • security • • scottalanmiller
      5
      1
      Votes
      5
      Posts
      839
      Views

      DominicaD

      @scottalanmiller said:

      No telling how often that this is attempted against high profile closed-source products and even less information on how often it is successful.

      Software companies don't want us to think about that.

    • scottalanmillerS

      US Fed Judge Orders DOJ to Turn Over Phone Tapping Records

      News
      • legal security • • scottalanmiller
      4
      1
      Votes
      4
      Posts
      1.3k
      Views

      scottalanmillerS

      What are the chances that they will follow through though?

    • scottalanmillerS

      Domino's Customer Database Stolen

      News
      • security • • scottalanmiller
      13
      0
      Votes
      13
      Posts
      1.6k
      Views

      scottalanmillerS

      In Europe, American pizza means French fries on it.

    • JaredBuschJ

      Yealink security hole

      IT Discussion
      • security yealink voip • • JaredBusch
      8
      2
      Votes
      8
      Posts
      2.5k
      Views

      scottalanmillerS

      @Dominica exactly. And you would be struggling to even do that. If locked down the extension would be locked by IP range and the phone would hopefully be blocked from making its own external VPN connections. So it really would only be a gateway to other security flaws. On its own it should do very little.

    • AmbarishrhA

      active directory real defense for domain admins

      IT Discussion
      • active directory security • • Ambarishrh
      6
      0
      Votes
      6
      Posts
      1.1k
      Views

      C

      I just followed this:
      http://community.spiceworks.com/how_to/show/907-gpo-to-push-out-local-administrators-across-a-domain

      Two minute job and I'm all sorted.

    • 1
    • 2
    • 28
    • 29
    • 30
    • 31
    • 32
    • 31 / 32