network security

  1. A

    Restrict File Type Renaming in Shared Directories on Internal Server

    How to limit anybody on server to change file types ranaming if it is possible in shared directories on internal network?
  2. P

    Windows 2003 R2 - Tracking user dumping files

    Do you guys know how I can track a user that dumps large files on my file server? I have this old 2003 r2 server that we use as files server. Each and everyday a person puts gb's and gb's of files. I have 350 users with tons of folders. I am trying to track this person down. Please help if...
  3. Z

    Windows 8 Workgroup connection problem

    I have a workgroup (versus homegroup) network through a linksys router. There are two mobile wifi clients Lapdog is an HP, Vista Home Surface is a MS Surface, RT 8.1 Two desktops are connected via Ethernet Office is Dell, Windows 8.1 and serves as a file server to the portables. Server...
  4. 3004375 - Update for Windows Command Line Auditing - Version: 1.0

    Revision Note: V1.0 (February 10, 2015): Advisory published. Summary: Microsoft is announcing the availability of an update for supported editions of Windows 7, Windows 8, Windows Server 2008R2 and Windows Server 2012 that expands the Audit Process Creation policy to include the command...
  5. Taste of Premier: How to Mitigate Pass-the-Hash and Other Forms of Credential Theft

    Lex Thomas welcomes Mark Simos, an Architect for the Cyber, Security and Identity team here at Microsoft, to discuss tools, techniques and services that are available to help mitigate “Pass-the-Hash” and other forms of cyber credential theft. Tune in as they give us an in-depth overview of the...
  6. Windows 7 Help - Building a Windows 7 network without a server

    Hi, I'm hoping someone here can help me before I get too lost. I have been asked to to put a network into a office over the holidays. The layout is going to be the following: Reception X 2 PC'S Front Office X 2 Printers Back offices X 4 PC's Main PC/Server X 1 Switch - 16 port Netgear switch...
  7. NEWS Inside the “wiper” malware that brought Sony Pictures to its knees [Update]

    Details of malware that may have been associated with the attack on Sony Pictures were disseminated in an FBI “Flash” earlier this week. A copy of the memorandum obtained by Ars Technica details “a destructive malware used by unknown computer network exploitation (CNE) operators” that can...
  8. TA14-295A: Crypto Ransomware

    Original release date: October 22, 2014 Systems Affected Microsoft Windows Overview Ransomware is a type of malicious software (malware) that infects a computer and restricts access to it until a ransom is paid to unlock it. This Alert is the result of Canadian Cyber Incident Response...
  9. TA14-290A: SSL 3.0 Protocol Vulnerability and POODLE Attack

    Original release date: October 17, 2014 Systems Affected All systems and applications utilizing the Secure Socket Layer (SSL) 3.0 with cipher-block chaining (CBC) mode ciphers may be vulnerable. However, the POODLE (Padding Oracle On Downgraded Legacy Encryption) attack demonstrates this...
  10. J

    Windows 7 domain login

    Dear All, Laptops on my Office are connected into My Server Domain . Every user has their own user and password to log on into domain (server). But I have problem if the user were out from the network (not connected to the domain) the user still can use their laptops. I need to know how to...
  11. TA14-212A: Backoff Point-of-Sale Malware

    Original release date: July 31, 2014 Systems Affected Point-of-Sale Systems Overview This advisory was prepared in collaboration with the National Cybersecurity and Communications Integration Center (NCCIC), United States Secret Service (USSS), Financial Sector Information Sharing and...
  12. TA14-002A: Malware Targeting Point of Sale Systems

    Original release date: January 02, 2014 | Last revised: February 05, 2014 Systems Affected Point of Sale Systems Overview Point of Sale Systems When consumers purchase goods or services from a retailer, the transaction is processed through what are commonly referred to as Point of Sale...
  13. TA14-212A: Backoff Point-of-Sale Malware

    Original release date: July 31, 2014 Systems Affected Point-of-Sale Systems Overview This advisory was prepared in collaboration with the National Cybersecurity and Communications Integration Center (NCCIC), United States Secret Service (USSS), Financial Sector Information Sharing and...
  14. T

    How can i stop other network user from logging on to my laptop?

    I'm on a net work that is shared. I have recently noticed event logs of another user logging on to my laptop. The first log on used my credentials and a name similar to mine. The next one was of that person changing the credentials and authority of that log on. After that there quit a few logs...
  15. Driving a Collectively Stronger Security Community with Microsoft Interflow

    Today, Microsoft is pleased to announce the private preview of Link Removed, a security and threat information exchange platform for analysts and researchers working in cybersecurity. Interflow uses industry specifications to create an automated, machine-readable feed of threat and security...
  16. T

    Windows 7 Configuration of firewall

    Hello! I just had a look at the options of my Windows 7 Home Premium firewall where I miss a feature which might be implemented but I haven't found it yet: Is there a way to block in / out connections of every program and specify which ones are permitted? As far as I know you need to create...
  17. Vulnerability in TCP Protocol Could Allow Denial of Service - Version: 1.0

    Severity Rating: Important Revision Note: V1.0 (June 10, 2014): Bulletin published. Summary: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow denial of service if an attacker sends a sequence of specially crafted packets to the...
  18. A

    Windows 7 How can I create a home wifi with WEP encryption?

    How can I create a home wifi with WEP encryption? Do I need to buy new one?My router is too old to provide good service.Do you have any ideas of good router? My friend recomment this software to me" My WIFI Router ". How do you think about this software?
  19. Windows 8 Is you IP address tied to you location or your router?

    Hi Quick question. As I mentioned elsewhere I was hit by lightning again. It took out my router, and I have a new one. Several sites have questioned my IP address since. One said that someone was trying to log into my Guild Wars 2 account from a different IP address etc. Is this because...
  20. TA14-002A: Malware Targeting Point of Sale Systems

    Original release date: January 02, 2014 Systems Affected Point of Sale Systems Overview Point of Sale Systems When consumers purchase goods or services from a retailer, the transaction is processed through what are commonly referred to as Point of Sale (POS) systems. POS systems consist of...