Search Results

Search found 66319 results on 2653 pages for 'windows security'.

Page 25/2653 | < Previous Page | 21 22 23 24 25 26 27 28 29 30 31 32  | Next Page >

  • Windows server reboot loop - uninstalling hotfixes

    - by Jack
    After installing 3 updates, my system is stuck in a reboot loop. I am using server 2008 r2. I have tried deleting pending.xml from the windows directory, so pelase don't suggest that. I tried dism /image:d:\ /cleanup-image /revertpendingactions which completed successfully but did not solve my issue I then tried: dism /image:d:\ /Remove-Package /PackageName: and sucusfully removed one of the 3 updates. The two updates that are left are not listed with the dism get-packages command, but are listed with the get-apppatches command. I cannot find a way to uninstall them with dism however. So my question is, how can I manually uninstall specific updates or hotfixes from within the winre environment?

    Read the article

  • Increase Security by Enabling Two-Factor Authentication on Your Google Account

    - by Jason Fitzpatrick
    You can easily increase the security of your Google account by enabling two-factor authentication; flip it on today for a free security boost. It’s not a new feature but it’s a feature worth giving a second look. Watch the above video for a quick overview of Google’s two-factor authentication system. Essentially your mobile phone becomes the second authentication tool–you use your password + a code sent to your phone to log into your account. It’s a great way to easily increase the security of your Google account, it’s free, and you can set it so that you only have to validate your home computer once every 30 days. Google Two-Step Verification [via Google+] HTG Explains: When Do You Need to Update Your Drivers? How to Make the Kindle Fire Silk Browser *Actually* Fast! Amazon’s New Kindle Fire Tablet: the How-To Geek Review

    Read the article

  • The Top Ten Security Top Ten Lists

    - by Troy Kitch
    As a marketer, we're always putting together the top 3, or 5 best, or an assortment of top ten lists. So instead of going that route, I've put together my top ten security top ten lists. These are not only for security practitioners, but also for the average Joe/Jane; because who isn't concerned about security these days? Now, there might not be ten for each one of these lists, but the title works best that way. Starting with my number ten (in no particular order): 10. Top 10 Most Influential Security-Related Movies Amrit Williams pulls together a great collection of security-related movies. He asks for comments on which one made you want to get into the business. I would have to say that my most influential movie(s), that made me want to get into the business of "stopping the bad guys" would have to be the James Bond series. I grew up on James Bond movies: thwarting the bad guy and saving the world. I recall being both ecstatic and worried when Silicon Valley-themed "A View to A Kill" hit theaters: "An investigation of a horse-racing scam leads 007 to a mad industrialist who plans to create a worldwide microchip monopoly by destroying California's Silicon Valley." Yikes! 9. Top Ten Security Careers From movies that got you into the career, here’s a top 10 list of security-related careers. It starts with number then, Information Security Analyst and ends with number one, Malware Analyst. They point out the significant growth in security careers and indicate that "according to the Bureau of Labor Statistics, the field is expected to experience growth rates of 22% between 2010-2020. If you are interested in getting into the field, Oracle has many great opportunities all around the world.  8. Top 125 Network Security Tools A bit outside of the range of 10, the top 125 Network Security Tools is an important list because it includes a prioritized list of key security tools practitioners are using in the hacking community, regardless of whether they are vendor supplied or open source. The exhaustive list provides ratings, reviews, searching, and sorting. 7. Top 10 Security Practices I have to give a shout out to my alma mater, Cal Poly, SLO: Go Mustangs! They have compiled their list of top 10 practices for students and faculty to follow. Educational institutions are a common target of web based attacks and miscellaneous errors according to the 2014 Verizon Data Breach Investigations Report.    6. (ISC)2 Top 10 Safe and Secure Online Tips for Parents This list is arguably the most important list on my list. The tips were "gathered from (ISC)2 member volunteers who participate in the organization’s Safe and Secure Online program, a worldwide initiative that brings top cyber security experts into schools to teach children ages 11-14 how to protect themselves in a cyber-connected world…If you are a parent, educator or organization that would like the Safe and Secure Online presentation delivered at your local school, or would like more information about the program, please visit here.” 5. Top Ten Data Breaches of the Past 12 Months This type of list is always changing, so it's nice to have a current one here from Techrader.com. They've compiled and commented on the top breaches. It is likely that most readers here were effected in some way or another. 4. Top Ten Security Comic Books Although mostly physical security controls, I threw this one in for fun. My vote for #1 (not on the list) would be Professor X. The guy can breach confidentiality, integrity, and availability just by messing with your thoughts. 3. The IOUG Data Security Survey's Top 10+ Threats to Organizations The Independent Oracle Users Group annual survey on enterprise data security, Leaders Vs. Laggards, highlights what Oracle Database users deem as the top 12 threats to their organization. You can find a nice graph on page 9; Figure 7: Greatest Threats to Data Security. 2. The Ten Most Common Database Security Vulnerabilities Though I don't necessarily agree with all of the vulnerabilities in this order...I like a list that focuses on where two-thirds of your sensitive and regulated data resides (Source: IDC).  1. OWASP Top Ten Project The Online Web Application Security Project puts together their annual list of the 10 most critical web application security risks that organizations should be including in their overall security, business risk and compliance plans. In particular, SQL injection risks continues to rear its ugly head each year. Oracle Audit Vault and Database Firewall can help prevent SQL injection attacks and monitor database and system activity as a detective security control. Did I miss any?

    Read the article

  • windowsupdate troubles on windowsxp after april 2014, plus an explorer error message

    - by sigma4500
    I've spent the last couple of days trying to install windows xp from a cd onto my desktop. The installtion is successful, and I can activate windows, but cannot run windows update. The error I receive from windows update is: Error number: 0x80240036 I understand that after april 2014 microsoft is no longer developing new patches, but I have presumed that customers would continue to have access to all the patches that where made up to this date. How can I install these patches? Is this possible? As mentioned, I can install windows and activate, but cannot run windowsupdate (Error number: 0x80240036). Seperately, there is an error with a windows explorer pull down menu (item) that asks: Is this copy of windows legal? How can I get rid of this message? I am not running a pirated, or illegal copy of windows and this message should not be there. I want continue running windows xp without windows update, but I need to get rid of this windows explorer error message.

    Read the article

  • moving dynamic disk from Windows to another Windows computer when original Windows is not available

    - by Andrei
    How do I mount dynamic disk on new system without access to the old OS ? I need to move Dynamic data disk from old Windows XP (Pro, SP3) system, where disk crashed, to new Windows system without having access to the old OS. On new system, Dynamic disk shows as "Dynamic - Foreign". Microfoft has instructions for moving Dynamic Disk [1]. But Microsoft assumes having access to the old system. But I do not have acess to the old system. I am struck with "Dynamic - Foreign" static of the disk on new system. Thanks WinXP Pro SP3 [1] http://technet.microsoft.com/en-us/library/cc779854(WS.10).aspx Move Disk to another computer.

    Read the article

  • Does Ubuntu generally post timely security updates?

    - by Jo Liss
    Concrete issue: The Oneiric nginx package is at version 1.0.5-1, released in July 2011 according to the changelog. The recent memory-disclosure vulnerability (advisory page, CVE-2012-1180, DSA-2434-1) isn't fixed in 1.0.5-1. If I'm not misreading the Ubuntu CVE page, all Ubuntu versions seem to ship a vulnerable nginx. Is this true? If so: I though there was a security team at Canonical that's actively working on issues like this, so I expected to get a security update within a short timeframe (hours or days) through apt-get update. Is this expectation -- that keeping my packages up-to-date is enough to stop my server from having known vulnerabilities -- generally wrong? If so: What should I do to keep it secure? Reading the Ubuntu security notices wouldn't have helped in this case, as the nginx vulnerability was never posted there.

    Read the article

  • Why can't I install apps on Windows 8 using specific dial-up modem connections?

    - by Vincent of Earth
    This problem has persisted since I first tried out Windows 8 Consumer Preview, and also affects Windows 8, Windows 8.1 Preview, and Windows 8.1. Specifically, the problem occurs when I try to install apps from the Windows Store on a Globe Tattoo Broadband or Smart Bro dial-up connection (two common ways of connecting to the internet in the Philippines). I can confirm that this isn't a problem with my copy of Windows or my Microsoft account because I was able to install any app on other connections like public WiFi. This problem has persisted on three different dongles and two different computers. So why can't I install apps on those two specific types of connections?

    Read the article

  • Windows XP SP3 install keeps rebooting

    - by TerryR
    The base fonts on my Windows XP Pro were corrupted. A suggested fix was to "install" XP again, essentially just to overwrite the WINNT folder hence resetting all the fonts. I downloaded the XP Pro SP3 installer from our corporate MSDN account, ran it straight from the HDD and at the very end it crashed and rebooted. Now it just keeps rebooting over and over after saying "Continuing installation...." I can't boot in Safe Mode, I can't get to a command prompt or anything. I'm out of ideas. Formatting the drive and performing a fresh install is NOT an option.

    Read the article

  • Windows SBS 2011 DNS Role (service) failing & needing restarting

    - by HaydnWVN
    Have a Windows SBS 2011 with Exchange that is handling all DNS for the network. Since getting a 3rd party (Hardware & Support) to setup a recieving FTP service and restricting Exchanges memory useage for another 3rd party product (Stock software) the local network seems to periodically 'lose the internet connection'. Delving deeper I found that the DNS service is somehow failing/stopping without the actual service on the server reporting such (nothing in event logs). A simple restart of the 'DNS Role' on the server solves the problem. The manager onsite reports that he has to do this most days in the afternoon - yet not at the same time and other days it works fine without a restart being required. I'm unable (lacking sufficient SBS2011 knowledge) to diagnose this further, ideally I would like the DNS Role to report (and log) the failure, then automatically restart itself.

    Read the article

  • Lockdown Your Database Security

    - by Troy Kitch
    A new article in Oracle Magazine outlines a comprehensive defense-in-depth approach for appropriate and effective database protection. There are multiple ways attackers can disrupt the confidentiality, integrity and availability of data and therefore, putting in place layers of defense is the best measure to protect your sensitive customer and corporate data. “In most organizations, two-thirds of sensitive and regulated data resides in databases,” points out Vipin Samar, vice president of database security technologies at Oracle. “Unless the databases are protected using a multilayered security architecture, that data is at risk to be read or changed by administrators of the operating system, databases, or network, or hackers who use stolen passwords to pose as administrators. Further, hackers can exploit legitimate access to the database by using SQL injection attacks from the Web. Organizations need to mitigate all types of risks and craft a security architecture that protects their assets from attacks coming from different sources.” Register and read more in the online magazine format.

    Read the article

  • Make windows vista file explorer act normally

    - by user25866
    Is there some file I can remove or something I can do to globally ensure that windows visa/xp/etc doesn't do annoying things? Annoying things: 1) Hide the file extension 2) All these "meta" columns I could care less about in "details" view (rating, album, date taken, Assistant's name, Artist, 35mm focal length, City, Other City, etc...). All I want are Name, size, date created, date modified, and file extension. MAYBE file chmod settings. 3) That garbage in the left pane known as "favorite links." (Documents, desktop, photos, music, etc...) 4) Switching between detail view, large icon view, thumbnail view, list view, and tiles when I goto differnt folders, all I want is detail view, with the same columns every time. That's it. I shouldn't have to get third party software to make my file system browseable, but if I need to so be it... Why are all these settings buried away? It feels like I have to apply them onto each folder every time.

    Read the article

  • PHP security regarding login

    - by piers
    I have read a lot about PHP login security recently, but many questions on Stack Overflow regarding security are outdated. I understand bcrypt is one of the best ways of hashing passwords today. However, for my site, I believe sha512 will do very well, at least to begin with. (I mean bcrypt is for bigger sites, sites that require high security, right?) I´m also wonder about salting. Is it necessary for every password to have its own unique salt? Should I have one field for the salt and one for the password in my database table? What would be a decent salt today? Should I join the username together with the password and add a random word/letter/special character combination to it? Thanks for your help!

    Read the article

  • WCF service and security

    - by Gaz83
    Been building a WP7 app and now I need it to communicate to a WCF service I made to make changes to an SQL database. I am a little concerned about security as the user name and password for accessing the SQL database is in the App.Config. I have read in places that you can encrypt the user name and password in the config file. As the username and password is never exposed to the clients connected to the WCF service, would security in my situation be much of a problem? Just in case anyone suggests a method of security, I do not have SSL on my web server.

    Read the article

  • Live Security Talk Webcast: Security Best Practices for Design and Deployment on Windows Azure (Leve

    Developing secure applications and services in the cloud requires knowledge of the threat landscape specific to the cloud provider. The key is understanding threat mitigations implemented by the cloud architecture versus those that are the responsibility of the developer. Register for this exciting live webcast to learn about the threats that are specific to the cloud and how the Windows Azure architecture deals with these threats. We also cover how to use built-in Windows Azure security features...Did you know that DotNetSlackers also publishes .net articles written by top known .net Authors? We already have over 80 articles in several categories including Silverlight. Take a look: here.

    Read the article

  • Missing disc when installing windows 7

    - by Anders
    Hi, when I was installing windows 7 on my new bought computer it asked me on which disc I would like to install the OS on, either the 1 tera byte disc or the ssd disc, I chose to install it on the ssd disc. But now when I have installed the OS, the 1 tera byte disc isn't visible in "my computer" and I don't know how to access it, I didn't do anything strange in the installation, that by the way is idiot secure. So my question, what do you think have happend and how do you believe that this issue is solved? Regards Anders

    Read the article

  • Download the Mountain Views from Romania Theme for Windows 7 and 8

    - by Asian Angel
    Are you ready to add some serene and beautiful mountain scenery to your desktop? Then you will definitely want to grab a copy of the Mountain Views from Romania Theme for Windows 7 and 8. The theme comes with five wonderful images from photographer Mihai Despan to add a peaceful mood to your favorite computer. Special Note: The photos in the theme do not contain the black strip shown in the image above. Those were ‘added’ during the image editing process for our post. Uncovering Artists Through Windows Themes – Mihai Despan [7 Tutorials] Why Enabling “Do Not Track” Doesn’t Stop You From Being Tracked HTG Explains: What is the Windows Page File and Should You Disable It? How To Get a Better Wireless Signal and Reduce Wireless Network Interference

    Read the article

  • What is the difference between Row Level Security and RPD security?

    - by Jeffrey McDaniel
    Row level security (RLS) is a feature of Oracle Enterprise Edition database. RLS enforces security policies on the database level. This means any query executed against the database will respect the specific security applied through these policies. For P6 Reporting Database, these policies are applied during the ETL process. This gives database users the ability to access data with security enforcement even outside of the Oracle Business Intelligence application. RLS is a new feature of P6 Reporting Database starting in version 3.0. This allows for maximum security enforcement outside of the ETL and inside of Oracle Business Intelligence (Analysis and Dashboards). Policies are defined against the STAR tables based on Primavera Project and Resource security. RLS is the security method of Oracle Enterprise Edition customers. See previous blogs and P6 Reporting Database Installation and Configuration guide for more on security specifics. To allow the use of Oracle Standard Edition database for those with a small database (as defined in the P6 Reporting Database Sizing and Planning guide) an RPD with non-RLS is also available. RPD security is enforced by adding specific criteria to the physical and business layers of the RPD for those tables that contain projects and resources, and those fields that are cost fields vs. non cost fields. With the RPD security method Oracle Business Intelligence enforces security. RLS security is the default security method. Additional steps are required at installation and ETL run time for those Oracle Standard Edition customers who use RPD security. The RPD method of security enforcement existed from P6 Reporting Database 2.0/P6 Analytics 1.0 up until RLS became available in P6 Reporting Database 3.0\P6 Analytics 2.0.

    Read the article

  • Install Ubuntu 13.10 in dual boot with Windows 8.1

    - by Xaxt
    I have a laptop with installed Windows 8.1 x64. I want to intstall Ubuntu 13.10 (x64 of cause) in dual boot with it. I've made bootable USB stick (using unetbootin) with Ubuntu and tried to boot with it. It boots fine, and allows me to choose language and asks whether I want to install Ubuntu or just boot it. But if I select any ot these options, it shows black screen and hangs. I've been waiting about 15 minutes for it, but nothing happened. Light of USB stick indicates that my laptop was not trying to read from it that time. I switched off EFI in BIOS, switched AHCI/SATA modes, burned ISO image to DVD and still same effect. This topic can be called a duplicated, but I have't find what it duplicates. In other topics people asked what will happen if they update Windows 8 to 8.1 having already dual boot and I have installed Windows 8.1 and want to install Ubuntu alongside with it Did I miss something?

    Read the article

  • Roll Your Own DIY Solar-Powered Security Camera Setup

    - by Jason Fitzpatrick
    If you’re looking to set up a security camera without running power or video lines, this solar-powered version combines a cheap Wi-Fi cam with a home-rolled solar setup to provide surveillance without wires. Courtesy of Reddit user CheapGuitar, the setup combines a dirt cheap off-brand Wi-Fi security camera, a Tupperware container spray painted black, some old camping solar panels, and a battery into a security camera that checks in as long as it’s in range of a Wi-Fi router or repeater. Hit up the link below to check out the build guide. Solar Powered Camera [via Hack A Day] HTG Explains: What Is Windows RT & What Does It Mean To Me? HTG Explains: How Windows 8′s Secure Boot Feature Works & What It Means for Linux Hack Your Kindle for Easy Font Customization

    Read the article

  • Fonts doesn't render in Chrome or IE in Windows Server 2008

    - by Martin Carlsson
    When I visit, for example, http://www.bolagsverket.se from a user account on this Windows 2008 Server, Chrome displays the site but all the text is gone. When I try in IE it's even worse, it doesn't even load the page, I jsut end up with this: http://dl.pixelstore.se/image/0y1f0y0w1J39 The fonts used for this site is (from CSS): font-family:Frutiger,Frutiger Linotype,Univers,DejaVu Sans Condensed,Liberation Sans,Nimbus Sans L,Geneva,Helvetica Neue,Helvetica,Arial,Tahoma,sans-serif If I edit the CSS through Chrome Developer Tools, and erase all fonts until Arial it suddenly works. The strange thing is that everything works fine from the administrator account, it's just (all) the user accounts that doesn't work. My guess is that Chrome/IE is asking for the fonts but somehow they are restricted in the user account. Instead of just ignoring the fonts they can't find they try to render them anyway. Any clue?

    Read the article

  • Take ownership in windows 7/8 does not work

    - by John
    I have taken ownership of my external HDD and now I should be able to access every folder but I can't. There are numerous folders for which I don't have the ownership of. I tried taking ownership of those but after I close/reopen an explorer windows the ownership resets itself to what it was before. For example I have a folder which now has this S-1-5-21-95661877-3860777391-1413521220-1000 and a subfolder of this which has Unable to display current owner. If I take the ownership of the subfolder it shows me as the owner but I still can't access it; I get "You don't currently have permission ...".

    Read the article

  • What should we be aware of when moving windows servers to another domain

    - by Klaus Byskov Hoffmann
    Hi everyone, We have a bunch of (virtual vmware) windows servers (2003 and 2008) that our hosting provider wants to move to a new domain. They also want to rename the servers. The hosting provider is in charge of maintaining the servers, while we are in charge of making sure that all our business applications are working. Our business applications include custom developed .net applications using such things as SQLServer 2008, TFS 2010, asp.net, some legacy COM+ apps, etc. To be honest I don't feel too convinced that this migration will be as painless as the hosting provider wants to make it sound. I would greatly appreciate any input on what we should be aware of when discussing the practicalities involved in the migration with the hosting provider. Thanks in advance. Klaus

    Read the article

  • Could it be sane to use Windows Server 2012 as desktop

    - by nCdy
    what about using it on desktop? I've got enough strong PC with intel core i7 and 8GB Ram so what should I think about: why not? Were looking about major differences compared to windows 8, found less. for example new file system - can it affect me? In my usual day I need development instruments alike visual studio, virtualization tools, and some games So far I can't find something that must stop me, everything I need can work (seems like) there. Tell me why I must not do it or if that is sane to do.

    Read the article

  • Windows 7 Image Restore with a smaller hard drive

    - by Vaccano
    I have a 500 GB drive that I have made a system image of. I would like to move that to a 250 GB drive (because it is a Solid State drive). I have made a Windows 7 Backup Image of my 500 GB drive. I am currently only using 163 GB of that drive. Can I just restore that to the target drive or will the restore be expecting a 500 GB drive? If it is expecting it I can shrink my partition to less that 250 and backup again. But I would rather not if that is not needed. Will the restore realize that it is not using all the space and just take what it needs?

    Read the article

  • Media Player is missing from the list in "Turn Windows features on or off"

    - by arsaKasra
    I decided to reinstall Media Player in Vista [this way], so I figured I should turn it off as a Windows feature. But when I continue with the procedure, I get an incomplete list of features, here's an image: I looked around a bit, wondering if that is only an option available in 7, and I have seen people saying different things. So, is this only available for 7 or is there something wrong going on here? Can I make Media Player to show up in here? I am on a Toshiba Satellite A100 with Vista Home Premium OEM. I don't have my recovery disks or any restore point. Just to mention, I currently do have Media Player and it's working fine. Sorry if I can't think of any more details to add, please ask me for anything I should have included.

    Read the article

< Previous Page | 21 22 23 24 25 26 27 28 29 30 31 32  | Next Page >