Do you guys know how I can track a user that dumps large files on my file server? I have this old 2003 r2 server that we use as files server. Each and everyday a person puts gb's and gb's of files. I have 350 users with tons of folders. I am trying to track this person down.
Please help if...
I have a workgroup (versus homegroup) network through a linksys router. There are two mobile wifi clients
Lapdog is an HP, Vista Home
Surface is a MS Surface, RT 8.1
Two desktops are connected via Ethernet
Office is Dell, Windows 8.1 and serves as a file server to the portables.
Server...
access denied
connection
desktop
error 0x80070005
file server
file sharing
linksys router
media repository
microsoft surface
mobile clients
networksecuritynetworking
permissions
samba
troubleshooting
windows 8.1
windows update
windows vista
workgroup
Revision Note: V1.0 (February 10, 2015): Advisory published.
Summary: Microsoft is announcing the availability of an update for supported editions of Windows 7, Windows 8, Windows Server 2008R2 and Windows Server 2012 that expands the Audit Process Creation policy to include the command...
administration
audit policy
auditing
command line
knowledge base
microsoft
networksecurity
processes
security
server 2008r2
server 2012
troubleshooting
windows 7
windows 8
windows update
Lex Thomas welcomes Mark Simos, an Architect for the Cyber, Security and Identity team here at Microsoft, to discuss tools, techniques and services that are available to help mitigate “Pass-the-Hash” and other forms of cyber credential theft. Tune in as they give us an in-depth overview of the...
active directory
cloud solutions
credential theft
cyber security
identity management
it architecture
microsoft
networksecurity
pass-the-hash
podcast
privileged access
security features
security overview
security tools
system center
teched
threat mitigation
virtualization
windows 10
windows server
Hi, I'm hoping someone here can help me before I get too lost.
I have been asked to to put a network into a office over the holidays. The layout is going to be the following:
Reception X 2 PC'S
Front Office X 2 Printers
Back offices X 4 PC's
Main PC/Server X 1
Switch - 16 port Netgear switch...
Details of malware that may have been associated with the attack on Sony Pictures were disseminated in an FBI “Flash” earlier this week. A copy of the memorandum obtained by Ars Technica details “a destructive malware used by unknown computer network exploitation (CNE) operators” that can...
computer networks
corporate reorganization
cyber attack
cybersecurity
data destruction
destructive software
fbi
file sharing
hacking
infection
malware
management features
network exploitation
networksecurity
north korea
reboot
sony pictures
system security
virus
windows
Original release date: October 22, 2014
Systems Affected
Microsoft Windows
Overview
Ransomware is a type of malicious software (malware) that infects a computer and restricts access to it until a ransom is paid to unlock it. This Alert is the result of Canadian Cyber Incident Response...
Original release date: October 17, 2014
Systems Affected
All systems and applications utilizing the Secure Socket Layer (SSL) 3.0 with cipher-block chaining (CBC) mode ciphers may be vulnerable. However, the POODLE (Padding Oracle On Downgraded Legacy Encryption) attack demonstrates this...
Dear All,
Laptops on my Office are connected into My Server Domain . Every user has their own user and password to log on into domain (server). But I have problem if the user were out from the network (not connected to the domain) the user still can use their laptops. I need to know how to...
Original release date: July 31, 2014
Systems Affected
Point-of-Sale Systems
Overview
This advisory was prepared in collaboration with the National Cybersecurity and Communications Integration Center (NCCIC), United States Secret Service (USSS), Financial Sector Information Sharing and...
Original release date: January 02, 2014 | Last revised: February 05, 2014
Systems Affected
Point of Sale Systems
Overview
Point of Sale Systems
When consumers purchase goods or services from a retailer, the transaction is processed through what are commonly referred to as Point of Sale...
antivirus
best practices
consumer protection
credit card
cybersecurity
data protection
data theft
debit card
digital fraud
firewall
fraud prevention
identity theft
malware
networksecurity
phishing
point of sale
pos systems
security practices
skimming
track data
Original release date: July 31, 2014
Systems Affected
Point-of-Sale Systems
Overview
This advisory was prepared in collaboration with the National Cybersecurity and Communications Integration Center (NCCIC), United States Secret Service (USSS), Financial Sector Information Sharing and...
anti-virus
backoff
brute force
command and control
consumer data
cybersecurity
data breach
exfiltration
financial sector
indicators of compromise
keylogging
malware
mitigation
networksecurity
payment systems
persistence techniques
point-of-sale
remote desktop
security solutions
threat detection
I'm on a net work that is shared. I have recently noticed event logs of another user logging on to my laptop. The first log on used my credentials and a name similar to mine. The next one was of that person changing the credentials and authority of that log on. After that there quit a few logs...
account management
credentials
event logs
laptop security
malware protection
networksecurity
os reinstallation
user access
user accounts
windows firewall
zone alarm
Today, Microsoft is pleased to announce the private preview of Link Removed, a security and threat information exchange platform for analysts and researchers working in cybersecurity. Interflow uses industry specifications to create an automated, machine-readable feed of threat and security...
Hello!
I just had a look at the options of my Windows 7 Home Premium firewall where I miss a feature which might be implemented but I haven't found it yet: Is there a way to block in / out connections of every program and specify which ones are permitted?
As far as I know you need to create...
Severity Rating: Important
Revision Note: V1.0 (June 10, 2014): Bulletin published.
Summary: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow denial of service if an attacker sends a sequence of specially crafted packets to the...
attack prevention
bulletin
denial of service
malware defense
microsoft windows
networksecuritysecurity update
severity rating
tcp protocol
vulnerability
How can I create a home wifi with WEP encryption? Do I need to buy new one?My router is too old to provide good service.Do you have any ideas of good router? My friend recomment this software to me" My WIFI Router ". How do you think about this software?
Hi
Quick question.
As I mentioned elsewhere I was hit by lightning again.
It took out my router, and I have a new one.
Several sites have questioned my IP address since.
One said that someone was trying to log into my Guild Wars 2 account from a different IP address etc.
Is this because...
Original release date: January 02, 2014
Systems Affected
Point of Sale Systems
Overview
Point of Sale Systems
When consumers purchase goods or services from a retailer, the transaction is processed through what are commonly referred to as Point of Sale (POS) systems. POS systems consist of...