Search Results

Search found 29513 results on 1181 pages for 'microsoft security essent'.

Page 181/1181 | < Previous Page | 177 178 179 180 181 182 183 184 185 186 187 188  | Next Page >

  • Des écrans bleus et des erreurs signalées suite à l'installation du Patch Tuesday de Microsoft, quatre mises à jour concernées

    Des écrans bleus et des erreurs signalées suite à l'installation du Patch Tuesday de Microsoft quatre mises à jour concernées Ce qui devait être de bon augure pour Microsoft est en train de se transformer en cauchemar, en effet quelques jours seulement après la publication du dernier patch Tuesday, censé apporter plus de stabilité aux différentes versions de Windows encore prises en charge et à d'autres produits comme Internet Explorer, Microsoft Office ou encore net Framework, plusieurs rapports...

    Read the article

  • Which modules can be disabled in apache2.4 on windows

    - by j0h
    I have an Apache 2.4 webserver running on Windows. I am looking into system hardening and the config file httpd.conf. There are numerous load modules and I am wondering which modules I can safely disable for performance and / or security improvements. Some examples of things I would think I can disable are: LoadModule cgi_module others like LoadModule rewrite_module LoadModule version_module LoadModule proxy_module LoadModule setenvif_module I am not so sure they can be disabled. I am running php5 as a scripting engine, with no databases, and that is it. My loaded modules are: core mod_win32 mpm_winnt http_core mod_so mod_access_compat mod_actions mod_alias mod_allowmethods mod_asis mod_auth_basic mod_authn_core mod_authn_file mod_authz_core mod_authz_groupfile mod_authz_host mod_authz_user mod_autoindex mod_dav_lock mod_dir mod_env mod_headers mod_include mod_info mod_isapi mod_log_config mod_cache_disk mod_mime mod_negotiation mod_proxy mod_proxy_ajp mod_rewrite mod_setenvif mod_socache_shmcb mod_ssl mod_status mod_version mod_php5

    Read the article

  • Preventing - Large Number of Failed Login Attempts from IP

    - by Silver89
    I'm running a CentOS 6.3 server and currently receive emails entitled "Large Number of Failed Login Attempts from IP" from my server every 15 minutes or so. Surely with the below configured it should mean only the person using the (my static ip) should be able to even try and log in? If that's the case where are these remote unknown users trying to log into which is generating these emails? Current Security Steps: root login is only allowed without-password StrictModes yes SSH password login is disabled - PasswordAuthentication no SSH public keys are used SSH port has been changed to a number greater than 40k cPHulk is configured and running Logins limited to specific ip address cPanel and WHM limited to my static ip only hosts.allow sshd: (my static ip) vsftpd: (my static ip) whostmgrd: (my static ip) hosts.deny ALL : ALL

    Read the article

  • How to merge several detached signatures from different people into one?

    - by Petr Pudlák
    A group of people wants to publish a file and they all want to digitally sign the file as different recipients of the file will have different chains of trust. For simplicity, it's desired that there is only one detached signature file with all the signatures, so that the recipients don't need to check them one by one: foo.tar.gz foo.tar.gz.sig However, for security reasons, every person needs to perform the signing on their computer, it's not possible to create the combined signature by having multiple private keys on one computer and performing the operation with one command. Is it possible with GPG to somehow merge detached signatures of a file from multiple participants?

    Read the article

  • Safety concerns on allowing connections to MySQL with no password on localhost?

    - by ÉricO
    In the case of a Linux system, is there any security concern to let MySQL users with standard privileges (that is, not the root users) connect to the database with no password from localhost? I think that enforcing a password even for localhost can add a layer of protection, since, with no password the database access would be compromised if the SSH access is itself compromised. Considering that, would it be less safe to allow no password connection to MySQL than having the same password for SSH and for MySQL? I don't know if that is to be taken into account, but we also use phpMyAdmin to let users administrate their own database. I am asking because I kinda dislike having to put our database passwords unencrypted in the source or configuration files of our applications, where they can easily be leaked unintentionally. Since our servers are configured to run our applications as the Linux user the application belongs to, I was considering allowing no password from localhost as a simple solution. So, would that be a very bad idea or not?

    Read the article

  • Windows Xp, Svchost.exe connecting to different ips with remote port 445

    - by Coll911
    Im using Windows Xp professional Sp2 Whenever i start my windows, svchost.exe starts connecting to all the possible ips on lan like from 192.168.1.2 to 192.168.1.200 The local port ranges from 1000-1099 and the remote port being 445. After its done with the local ips, it starts connecting to other random ips. I tried blocking connections to the port 445 using the local security polices but it didn't work Is there any possible way i could prevent svchost from connecting to these ips without involving any firewall installed ? since my pc slows down due to the load I'd be thankful for any advices

    Read the article

  • What version will be chosen by MSXML2.XMLHTTP request, without version suffix? [migrated]

    - by jayarjo
    Probably every web developer is familiar with a pattern like this: var xmlHttp = null; if (window.XMLHttpRequest) { // If IE7, Mozilla, Safari, and so on: Use native object. xmlHttp = new XMLHttpRequest(); } else { if (window.ActiveXObject) { // ...otherwise, use the ActiveX control for IE5.x and IE6. xmlHttp = new ActiveXObject('MSXML2.XMLHTTP'); } } But the question is - if there are multiple MSXML versions available on the client's PC (let's say 3.0, 5.0, 6.0), which one of them will be chosen by MSXML2.XMLHTTP call (notice no version suffix at the end)? Will it be the latest or - not necessarily? And a side-question - is it possible to check which version was chosen?

    Read the article

  • Identifying program attempting to install certificate on windows

    - by R..
    I'm trying to help a friend using Windows (which I'm not an expert on by any means) who's experiencing malware-like behavior: a dialog box is repeatedly popping up reading: You are about to install a certificate from a certification authority (CA) claiming to represent: CE_UmbrellaCert Warning: If you install this root certificate, Windows will automatically trust any certificate issued by this CA. Installing a certificate with an unconfirmed thumbprint is a security risk. If you click "yes" you acknowledge this risk. AV and anti-malware scanners don't detect anything. My friend hasn't accepted installing the certificate, but whatever program is trying to install it keeps retrying, making the system unusable (constant interruptions). Is there any way to track down which program is making the attempt to install it so this program can be uninstalled/deleted?

    Read the article

  • Tool to launch a script driven by modem activity

    - by Will M
    Can anyone suggest a software tool (preferably under Windows XP or later) that would launch an application or script in response to a phone call being received on a landline phone line connected to a data modem on the same PC? or, better, in response to a sequence of touch-tones being played over such a phone line. This would allow, for example, using the telephone to manipulate firewall settings so as to create another layer of security in connection with remote internet access to that computer. I seem to recall seeing tools to do this sort of thing in the days before broadband internet access, when there was more attention to various tips and tricks for the dial-up modem, but a few attempts at Google hasn't turned anything up.

    Read the article

  • Run application with other user

    - by user62367
    OS: Fedora 14 GUI: GNOME I need to run an application with another user then the "default" (normally used). Purpose: create a ".desktop" file on my desktop to run e.g.: Google Chrome with another user (NOT ROOT! - so beesu doesn't count.) There aren't any gksu, or kdesu packages in Fedora 14. Why? So i want to create a user with "adduser SOMEONE", and i want to run e.g.: Google Chrome with "SOMEONE" - then it will have minimum permissions, "more security". Thank you!

    Read the article

  • Team Foundation Server– Debug symbols(pdb files) generated in Release build? Fix it.

    - by Gopinath
    Yesterday I setup TFS for my .NET playground website to implement continuous integration and deployments. After a successful build I noticed that debug symbols(pdb files) were generated even though TFS is configured to build in Release mode.  After a bit of analysis its turned out to be the behavior of TFS to generate debug symbols (pdb files) until we pass the attribute DebugType = None. Here are the steps to pass DebugType parameter to MSBuild of TFS Go to Team Explorer Select Build Defintion >> Edit Build Definition Switch to Process tab Navigate to Advanced Section and locate MSBuild Arguments Add the following: /p:Configuration=Release /p:DebugType=none

    Read the article

  • Live Chats .NET : le transcript de la deuxième session disponible, prochain rendez-vous avec les experts de Microsoft le 25 juin

    Live Chats .NET : le transcript de la deuxième session disponible prochain rendez-vous avec les experts de Microsoft le 25 juinLe 14 mai dernier, s'est tenue la deuxième session du live chat .NET sur le chat de Developpez.com. Pour rappel, les live chats .NET sont organisés en collaboration avec Microsoft. Ce sont des séances de chat en ligne avec des experts de la société sur le développement d'applications Desktop avec la plate-forme .NET et le futur des outils de développement Microsoft.Les...

    Read the article

  • Apache trailing slash added to files problem

    - by Francisc
    Hello! I am having a problem with Apache. What it does is this: Take /index.php file containing an code with src set to relative path myimg.jpg, both in the root of my server. So, www.mysite.com would show the image as would www.mysite.com/index.php. However, if I access www.mysite.com/index.php/ (with a trailing slash) it does the odd thing of executing index.php code as it would be inside an index.php folder (e.g. /index.php/index.php), thus not showing the image anymore. This is a simple example that's easy to solve with absolte addressing etc, the problem I am getting from this a security one that's not so easily fixed. So, how can I get Apache to give a 403 or 404 when files are accessed "as folders"? Thank you.

    Read the article

  • Microsoft lance TypeScript, un sur-ensemble de JavaScript, en réponse à Google Dart ?

    Microsoft lance TypeScript un sur-ensemble de JavaScript. [IMG]http://www.typescriptlang.org/content/images/logo_small.png[/IMG] Microsoft répond peut-être à l'apparition de Google Dart en annonçant la sortie d'un nouvel outil de type JavaScript. Effectivement, TypeScript est un sur-ensemble de JavaScript, les deux syntaxes se ressemblent fortement et tout code JavaScript est un programme TypeScript valide. Son auteur n'est autre que Anders Hejlsberg, concepteur du Framework .NET et chef de l'équipe C# à Microsoft.

    Read the article

  • Windows Phone 7 : Microsoft publie une mise à jour préparatoire qui annonce la mise à jour de mars

    Windows Phone 7 : Microsoft publie une mise à jour préparatoire Qui annonce la mise à jour de mars Mise à jour du 22/02/11, par Hinault Romaric Microsoft vient de démarrer la première étape du processus de mise à jour de son OS mobile Windows Phone 7. Pour préparer la première mise à jour de Windows Phone 7 prévu en début du mois de mars (ajout du copier-coller, amélioration des performances du téléphone lors du chargement, meilleur basculement entre les applications), Microsoft vient de publier une autre mise à jour, qualifiée d'étape préparatoire. Selon Microsoft, cette première « mise à jour » est conçue pour a...

    Read the article

  • Why does Bing not show my adcenter ads though there is enough space

    - by gamma
    I created several campaigns using the MS adcenter. I'm targeting the whole world at any time with 2-3 placement texts per keyword group. The bids I placed are sometimes quite high, so they should get displayed. When I try to search for my keywords in Bing nothing gets displayed, though there is plenty of space for it. Bing mostly displays 2-3 ads, but the ones at the right side rather seldom. I'd like to know, how I can improve the fact that my ads are not being displayed - without increasing the bids any further.

    Read the article

  • Microsoft rapproche ses plateformes de messagerie instantanée, Skype 5.11 s'intègre avec Messenger, Hotmail, Xbox et Outlook.com

    Microsoft rapproche ses plateformes de messagerie instantanée et VoIP Skype 5.11 s'intègre avec Windows Live Messenger, Hotmail, Xbox et Outlook.com Désormais, vous pouvez joindre l'ensemble de vos contacts des différentes plateformes de Microsoft en un seul clic grâce à Skype 5.11. [IMG]http://idelways.developpez.com/news/images/skype511.png[/IMG] Cette nouvelle version de Skype s'intègre avec Microsoft Windows Live Messenger, Hotmail, Xbox et Outlook.com. À présent, l'utilisateur est invité à se connecter sur Skype en entrant son identifiant de Windows Live Messenger (ID), il retrouvera par la suite la liste de tous ses contacts Messenger et sera en mesu...

    Read the article

  • Error connecting ESX 5.0.0 to domain

    - by Saariko
    I am trying to connect an ESX 5.0.0 to our Domain Controler, in order to give a Domain group specific roles security. But I do not see any groups after the host connects to the domain. Under Configuration - Authentication Services - I connected the host to the domain: I created the role I wanted, with the selected approved features But when I want to add a permission to a set of VM's, I can not see "my domain" on the drop down, only the: "localhost" How do I see "my domain" on the Domain drop down - so I can select the domain group to give the role to? To note: I followed the instructions to connect to the domain form VMware site.

    Read the article

  • Microsoft pourrait dévoiler une version de Windows 7 optimisée pour les architectures ARM et pour les tablettes, lors du CES 2011

    Microsoft pourrait dévoiler une version de Windows 7 optimisée pour les architectures ARM Et pour les tablettes, lors du CES 2011 Microsoft fera une démonstration d'une version de son système d'exploitation Windows tournant sur une architecture ARM. Les rumeurs vont bon train concernant la keynote de Steve Ballmer PDG de Microsoft lors de la conférence CES (Consumer Electronics Show) de Las Vegas qui aura lieur du 6 au 9 janvier 2011. Après la rumeur sur la présentation de Windows 8 s'exécu...

    Read the article

  • How to make a secure MongoDB server?

    - by Earlz
    Hello, I'm wanting my website to use MongoDB as it's datastore. I've used MongoDB in my development environment with no worries, but I'm worried about security with a public server. My server is a VPS running Arch Linux. The web application will also be running on it, so it only needs to accept connections from localhost. And no other users(by ssh or otherwise) will have direct access to my server. What should I do to secure my instance of MongoDB?

    Read the article

  • Internet Explorer : Microsoft rejoint la Phishing Initiative, un projet commun avec Paypal et le CERT-LEXSI contre l'hameçonnage

    Internet Explorer : Microsoft rejoint la Phishing Initiative Un projet commun avec Paypal, et le CERT-LEXSI contre l'hameçonnage En partenariat avec le CERT-LEXSI, Microsoft participe à la « phishing initiative » afin de fournir aux utilisateurs français d'Internet Explorer une meilleure protection contre le hameçonnage. Après l'annonce de l'introduction d'une fonctionnalité contre le traçage sur le web dans IE9 Microsoft ne s'arrête pas là malgré les études présentant

    Read the article

  • Microsoft Office sur iOS et Android : en 2013 ? Oui, non... peut-être

    Microsoft Office pour iPhone et Android Oui, non... peut-être Soyons prudent. Rien n'est encore très clair avec le « Buzz IT » du jour : Microsoft Office débarquerait sur iOS (iPhone, iPad, iPod) et Android dès 2013. L'information vient du site américain The Verge qui tiendrait lui-même le « scoop » de sources internes à Microsoft. D'après ses sources, rien de bien révolutionnaires cependant. Microsoft Office serait disponible sous la forme d'une application gratuite (histoire de ne pas financer des concurrents ?) qui ne permettra que la lecture des fichiers Word, PowerPoint, et Excel. Toujours d'après le site, l'édition des documents ne sera possible qu'avec un compte Offi...

    Read the article

  • What programming language was used to develop Windows OS?

    - by nardo
    I am very new to programming and I have started to learn programming just last week. I am still having trouble understanding about programming languages, especially what to use in a particular system. My first language is Java and its the only programming language I have experience with. I know there are a lot of programming languages out there but I am so curious what programming language was used to develop Windows? Is Java can be used to develop an OS?

    Read the article

  • How to check the OS is running on bare metal and not in virtualized environment created by BIOS?

    - by Arkadi Shishlov
    Is there any software available as a Linux, *BSD, or Windows program or boot-image to check (or guess with good probability) the environment an operating system is loaded onto is genuine bare metal and not already virtualized? Given recent information from various sources, including supposed to be E.Snowden leaks, I'm curious about the security of my PC-s, even about those that don't have on-board BMC. How it could be possible and why? See for example Blue Pill, and a number of papers. With a little assistance from network card firmware, which is also loadable on popular card models, such hypervisor could easily spy on me resulting in PGP, Tor, etc. exercises futile.

    Read the article

  • How to Export a Contact to and Import a Contact from a vCard (.vcf) File in Outlook 2013

    - by Lori Kaufman
    vCard is the abbreviation for Virtual Business Card and is the standard format (.vcf files) for electronic business cards. vCards allow you to create and share contact information over the internet, such as in email messages and instant messaging. You can also use vCards to move contact information from one email or personal information management program to another, as long as both programs support the .vcf file format. vCards can contain name and address information, as well as phone numbers, email addresses, URLs, images, and audio clips. We will show you how to export a contact to and import a contact from a vCard, or .vcf file, in Outlook. First access the People section by clicking People at the bottom of the Outlook window. To view your contact in business card format, click Business Card in the Current View section of the Home tab. Select a contact by clicking on the name bar at the top of the business card. To export the selected contact as a vCard, click the File tab. On the Account Information screen, click Save As in the list of options on the left. The Save As dialog box displays. By default, the name of the contact is used to name the .vcf file in the File name edit box. Change the name, if desired, select a location for the file, and click Save. The contact is saved as a .vcf file. To import a vCard, or .vcf file, into Outlook, simply double-click on the .vcf file. By default, .vcf files are automatically associated with Outlook, so the file is opened in Outlook as a Contact. Make any changes or additions to the contact in the contact editing window. To save the contact, click Save & Close in the Actions section of the Contact tab. NOTE: Notice that because this contact is new, the full contact editing window displays rather than the Contact Card that displays when double-clicking on a contact. You can open the full contact editing window instead of the Contact Card when editing a contact or searching for a contact. The contact is added to the Contacts folder. You can add your contact information to a signature in business card format, and it will display as shown above in emails. We have covered how to create signatures and will be discussing more about signatures and business cards in Outlook.     

    Read the article

< Previous Page | 177 178 179 180 181 182 183 184 185 186 187 188  | Next Page >