Comments
-
That's why I thoroughly research them before I answer
-
I agree hints this question are bad. Ended up being the first answer I thought of, but was too worried to try. After like 1.5 hours of digging, I decided to try it and it was right!
-
This is really good. At my college I actually implemented a "Security Game" in conjunction with my computer security instructor. It's just a simple thing. When you run it, it tells you that you caught *james Longworth* and has you give your credentials to log in to the Active Directory (so you can't impersonate someone…
-
that makes a lot of sense when they are monitored 24/7
-
I don’t understand; we have to read the question before answering? Ugh! That Must be what I’ve been doing wrong this whole time!!
-
I wonder what they were using that allowed them to retroactively determine that it was HeartBleed and not some other attack. This brings up an interesting point: I’m wondering if people are going to try to blame and breaches that originated in the last few months on HeartBleed. I.E. “Well, someone hacked our website and…
-
I know what you mean. And if people would contribute as much money and effort as they do to making a MS solution work (and work well, then they could pay their employees and coders to work on open source projects and still save money! But enough of my open source-designed toolbox.
-
I thiiink this should win me a jambox riiight?
-
That is the all-important difference to me. If the user sees a prompt that they have to let their device be owned plus there is the fact that your well written policy also mentions it. The user has the option to turn down that and just not be allowed access to the corporate resources. It’s the same exact thing as saying…
-
First thing that comes to mind with unmitigated HTTP is how easy it would be for one of your core servers that was infected with a botnet to check a webserver and get instructions. second thing is using http to upload all of your companies secret goodies over http. ...
-
I would totally paintball while gocarting. That reminds me of theDEADPOOL TEST FOOTAGE Ft Ryan Reynolds - YouTube especially 1:15 in.
-
Lol I've had that happen too! I shredded them and left notes in there place that that was against policy! the notes (one in replacement for each set of passwords) said "Writing down or storing passwords in plaintext is prohibited by policy!" I know it seems like alot, but I printed them up since it was happening a lot. I…
-
Well, right now the certification is free for SolarWinds.
-
Also, just wanted to point out. If the person had: * reported suspicious activity to their IT department ("I could have sworn I just got an email from the bank, but there isn't one there now", "what's with these extra auth codes", "what is this mightytext in my battery usage screen?" ) * Checked their usage history for out…
-
Yeah! i would be interested in a recording also! I have a campus-wide meeting that'll last a couple hours right in the middle of this, but I would really enjoy seeing it!
-
Tell you what, if you get my name on the list, I’ll do my best to get your name on the list. Sound like a plan?
-
After all, the network arbitrarily breaks applications at random This is especially funny when you work with developers claiming you changed something in the network and now their program (that they're actively developing (changing)) doesn't work right anymore
-
I would totally go for a 1$/mo/channel option. Maybe even a few $ for some channels (movie channels and the like) What would be really nice (and scary at the same time) is if the company behind each channel just started offering their own service, still just whatever is already showing but streamed. The scary part would be…
-
So, what you're saying is, you haven't heard of cygwin to fix the windows command line?
-
Especially an unpaid endorsement like that
-
First, I would try and talk to them and see if they could do a raise to something more decent. If you have already done that or they just weren't having it, then it might be worth applying to another job and getting offers (even a bit away or moving). If you can show them that you can get paid blah% more if you do move,…
-
This is where I really see the value of these systems. You can see what happened (device heating up) , you might see a trap or syslog telling what the problem was (some kind of critical error I'm sure), see model numbers which helped you do some research which lead you to the problem, and then it even made it easy to grab…
-
Or to get their suite
-
If you have it handy (and it’s in good condition) Maybe post some pics of the inside and stuff? thwack.solarwinds.com/.../239938
-
There were at least three things you could respond in the negative toward in my post, you’re going to have to be more specific.
-
I gathered that from the blogger.com part, I was just telling you that it wasn't letting me see it. That tends to be a common reason for blogging
-
LOL no problem Patricks
-
This Triangle Radio is talking about is called the CIA Triad, it's a concept from Infosec certifications. I believe some of my studying said it was possibly created by ISACA? That might be total BS, but whoever made it doesnt really matter The Idea being that Infosec risks tend to fall into one or more of the categories of…
-
With my employer it has basically been leaning on different vendors for different things. If you need networking you go here... computers/servers are over here...Monitoring is SW...software solutions are blah. We are a windows environment, but for everything else it's a bit of a sprawl.
-
Just twice? I WANT that alienware!! In fact, I want all of these prizes! Is it against the rules to win all five? (If I win all five after I said this, I'm going to die, if y'all don't kill me first!)