ManageEngine ADAudit Plus is a web-based, real-time, Windows Active Directory change auditing and reporting solution. Enterprises can audit the Windows AD, Windows file servers, Windows servers, Windows workstations, NetApp filers, EMC servers, printers, and removable storage devices. At ADAudit Plus, we make the best effort to ship a product that is ready to go! Yet the Windows server environment includes a few configuration hurdles that our customer support are happy to solve when our customers and evaluators call.
Apple Releases Patches for Shellshock Bug
Apple has released updates to insulate Mac OS X systems from the dangerous “Shellshock” bug , a pervasive vulnerability that is already being exploited in active attacks.
We Take Your Privacy and Security. Seriously.
“Please note that [COMPANY NAME] takes the security of your personal data very seriously.” If you’ve been on the Internet for any length of time, chances are very good that you’ve received at least one breach notification email or letter that includes some version of this obligatory line. But as far as lines go, this one is about as convincing as the classic break-up line, “It’s not you, it’s me.” I was reminded of the sheer emptiness of this corporate breach-speak approximately two weeks ago, after receiving a snail mail letter from my Internet service provider — Cox Communications .
The Great Wi-Fi Experiment
We all love using free public WiFi.
A Taste of the Great Wi-Fi Experiment
We all love using free public WiFi.
Automating Inactive User Controls
With so many compliance regulations requiring controls over inactive users, it is important to ensure that these user accounts in Active Directory are correctly managed. There are significant security risks associated with leaving inactive users enabled or available (or both) in Active Directory. In a previous blog on tracking down inactive users in Active Directory, I explained how you can leverage ADManager Plus to accomplish this task
Loadbalancer.org product roadmap (as always a work in progress)
Understandably we get quite a few requests for a product road map. We’ve had a chat about this internally and thought that it would be nice to have a permanent post on the blog that we change on the fly as customer requirements change
Next on SolarWinds Lab: Configuring DB File IO Monitoring (Local and Cloud Based)
Tune in to http://lab.solarwinds.com on October 15th, 2014 at 1pm Central to catch this month’s episode where Patrick Hubbard, Lawrence Garvin and Thomas LaRock will show you how to analyze…
Shellshock – WSWiR Episode 123
Serious Bash Flaw affects *nix, Mac OS X, and IoT Normally, my weekly video covers a number of important information and network security stories, in order to keep you informed of the latest threats. However, this week one story is so important I give it the primary focus. Today’s show covers the critical “Shellshock” vulnerability in Bash.
Signature Systems Breach Expands
Signature Systems Inc. , the point-of-sale vendor blamed for a credit and debit card breach involving some 216 Jimmy John’s sandwich shop locations, now says the breach also may have jeopardized customer card numbers at nearly 100 other independent restaurants across the country that use its products. Earlier this week, Champaign, Ill.-based Jimmy John’s confirmed suspicions first raised by this author on July 31, 2014 : That hackers had installed card-stealing malware on cash registers at some of its store locations