VoipSwitch Security Audit
|
|
|
- Lawrence Atkins
- 10 years ago
- Views:
Transcription
1 VoipSwitch Security Audit Security audit was made at 1 st January 2013 (3.00 PM PM UTC +1) by John Doe who is Security Advisor at VoipSwitch Company. Server's IP address : Server has also assigned second IP address : Firewall Checking firewall status and rules regularity. Customer claimed that there is no external firewall before server. Windows Server Firewall was turned on and configured with standard VoipSwitch rules (there were rules added for proper running Voipswitch modules). One rule named Rule allows all incoming TCP traffic which is serious risk for server's safety. 2. Access Policy Checking all access ways to the server. Checking users/passwords policy. Server had two access ways : Remote Desktop Radmin software
2 Remote desktop : on standard port open in Windows Firewall for all IP addresses password was strong Radmin software on standard port not limited for IP in Radmin software open in Windows Firewall for all IP addresses password was weak (6 letters without numbers and special chars) Users policy: Only Administrator user had access with administrator's privileges and there weren't any other users with access privileges.
3 3. Backdoor check Checking most common backdoor on Windows based system. Image File Execution Options in Registry was clear. Sethc.exe file was original. There wasn't backdoor set. 4. Antivirus Scan Microsoft Security Essentials full scaning. Microsoft Security Essentials full scan didn't point any suspicious files.
4 5. Processes Checking all unsigned processes which may affect on server's safety. Processes checked with Micrososft Process Explorer tool. There weren't any suspicious processes running. 6. Services Checking all running services which may affect on server's safety. Except Voipswitch and Radmin Server services there were no additional services added. 7. Installed applications Checking all unwanted applications which may affect on server's safety. There werent any unwanted applications installed. 8. Task Scheduler Checking all scheduled tasks which may affect on server's safety. There was task which starts unauthorized powershell script at system's startup. Script was in d:\install directory. Named as hack.ps1
5 9. Autostart Checking all autostart entries. There were two applications which start with system: Microsoft Security Essentials client Cobian application These applications were authorized by customer.
6 10. Shared Files Checking all shared spaces available from external networks. On www server space there was zipped vsportal folder. It contained config files with database credentials. Listing directory was turned off, but anyone who guessed name of file, could download it.
7 There wasn't any FTP similar service. There were no other shared/public folders. 11.Database Checking databases users privileges, database port. MySQL server database was running on 3306 port. Port was closed in Windows Firewall. There is only root user available on localhost.
8 12. Access logs Checking availability of all access logs. List of all logged IP addresses (on request). RDP : Logs are available since 1 st Dec 2012 due size of log file. All connections were only from confirmed by client IP address. Radmin : Events log was turned off. There wasn't possibility of checking logs. 13.Security of VoipSwitch modules Checking versions, settings of VoipSwitch modules. Checking passwords strength of clients. Access password to VSC3 was weak (only 5 letters, without special characters). All other clients passwords are strong. All web modules versions was the latest and stable.
9 14. Open ports External TCP port scan of server. IP: Open ports : 80,110,135,143,403,443,1720,1800,1801,1804,1935,5060,7070,9090 IP: Open ports : 80,110,135,143,403,443,1720,1800,1801,1804,1935,5060,7070, Hacking incident (if exists) Investigation based on customer's informations/suspiscions. Client didn't provide any information about hacking incidents 16. Changes on server after audit (on request) Rule named 'Rule' was deleted in Windows Firewall. Radmin access password was changed Task named 'Hack' was deleted in Task Scheduler Zipped VSPortal was removed in wwwroot2 Quota for security logs was increased Radmin access logs was turned on VSC3 password was changed
10 Security Advices 1. Access Access port should be other than default. Default ports for example access services: Remote Desktop Services (3389) Radmin (4899) VNC (5900, 5800, 5500) Access should be limited to few IP addresses All remote support connections will be established from our VPN IP / Remote access should be limited on your firewall only to / and the switch owner IP address. 2. Users policy The best if after system installation (before VoipSwitch installation) you will create separate user account than Administrator. It helps fight with any scan attack or brute-force attack, because every server has Administrator account. You may use very strong password for Administrator account and create other account with administrator's privileges for all works on server (like installations, support works, etc.). Only you should know Administrator account password and no one else. Once for month you should check users list for any not authorized changes. 3. Passwords policy Make sure that your password is strong.
11 Strong means: has at least seven letters doesn't contain a name or dictionary wordis different from other/previous passwords contains characters from each of four groups: uppercase letters, lowercase letters, numbers, symbols on the keyboard except letters and numbers Password can't be longer than 127 characters. Password should be changed at least once for month. Do not provide logins or passwords in Tickets Comments and s. Change your access username/password once Voipswitch Support have completed their work and the ticket has been closed. 4. Updates Every system need to be updated, due new features or fixing old. Also in security, there are many updates which improve server's safety. All the latest updates should be installed. You should schedule restars of server if needed. 5. Firewall As your server has public IP address, everyone can check it on the Internet. Everyone can send ports scan or any brute force (to break your passwords) or flood attack (to block your network). Nowadays it's unacceptable to not use a firewall on the server. 6. Antivirus Application Every Windows based server has Internet Explorer browser. If you don't have installed the latest updates, browsing the Internet on server is pretty dangerous. Antivirus application will help check if any unauthorized software is on server (even by mistake). We recommend Microsoft Security Essentials application. Don't install any 3rd party applications if you are not sure that are safe.
12 7. Few advices for VPS modules. After fresh VoipSwitch installation process, change Admin password into VSM/VSC. Don't create users with passwords shorter than 6 characters. Remember that Wholesale Clients may be authorized not only by IP address and set strong password for them too. Check Logs window on VoipSwitch application - you will notice any unauthorized register or call attempts there.
SETTING UP REMOTE ACCESS ON EYEMAX PC BASED DVR.
SETTING UP REMOTE ACCESS ON EYEMAX PC BASED DVR. 1. Setting up your network to allow incoming connections on ports used by Eyemax system. Default ports used by Eyemax system are: range of ports 9091~9115
Setting Up Scan to SMB on TaskALFA series MFP s.
Setting Up Scan to SMB on TaskALFA series MFP s. There are three steps necessary to set up a new Scan to SMB function button on the TaskALFA series color MFP. 1. A folder must be created on the PC and
Cloud Server powered by Mac OS X. Getting Started Guide. Cloud Server. powered by Mac OS X. AKJZNAzsqknsxxkjnsjx Getting Started Guide Page 1
Getting Started Guide Cloud Server powered by Mac OS X Getting Started Guide Page 1 Getting Started Guide: Cloud Server powered by Mac OS X Version 1.0 (02.16.10) Copyright 2010 GoDaddy.com Software, Inc.
VERSION 9.02 INSTALLATION GUIDE. www.pacifictimesheet.com
VERSION 9.02 INSTALLATION GUIDE www.pacifictimesheet.com PACIFIC TIMESHEET INSTALLATION GUIDE INTRODUCTION... 4 BUNDLED SOFTWARE... 4 LICENSE KEY... 4 SYSTEM REQUIREMENTS... 5 INSTALLING PACIFIC TIMESHEET
Windows Remote Access
Windows Remote Access A newsletter for IT Professionals Education Sector Updates Issue 1 I. Background of Remote Desktop for Windows Remote Desktop Protocol (RDP) is a proprietary protocol developed by
SECURING YOUR REMOTE DESKTOP CONNECTION
White Paper SECURING YOUR REMOTE DESKTOP CONNECTION HOW TO PROPERLY SECURE REMOTE ACCESS 2015 SecurityMetrics SECURING YOUR REMOTE DESKTOP CONNECTION 1 SECURING YOUR REMOTE DESKTOP CONNECTION HOW TO PROPERLY
EZblue BusinessServer The All - In - One Server For Your Home And Business
EZblue BusinessServer The All - In - One Server For Your Home And Business Quick Start Guide Version 3.8 1 2 3 EZblue Server Overview EZblue Server Installation EZblue Server Configuration 4 EZblue Magellan
IIS, FTP Server and Windows
IIS, FTP Server and Windows The Objective: To setup, configure and test FTP server. Requirement: Any version of the Windows 2000 Server. FTP Windows s component. Internet Information Services, IIS. Steps:
Application Note: FTP Server Setup on computers running Windows-7 For use with 2500P-ACP1
Application Note: FTP Server Setup on computers running Windows-7 For use with 2500P-ACP1 The CTI 2500P-ACP1 is capable of transferring data files to a remote FTP Server. This document provides information
Plesk 11 Manual. Fasthosts Customer Support
Fasthosts Customer Support Plesk 11 Manual This guide covers everything you need to know in order to get started with the Parallels Plesk 11 control panel. Contents Introduction... 3 Before you begin...
Server Installation, Administration and Integration Guide
Server Installation, Administration and Integration Guide Version 1.1 Last updated October 2015 2015 sitehelpdesk.com, all rights reserved TABLE OF CONTENTS 1 Introduction to WMI... 2 About Windows Management
EZblue BusinessServer The All - In - One Server For Your Home And Business
EZblue BusinessServer The All - In - One Server For Your Home And Business Quick Start Guide Version 3.11 1 2 3 EZblue Server Overview EZblue Server Installation EZblue Server Configuration 4 EZblue Magellan
Nixu SNS Security White Paper May 2007 Version 1.2
1 Nixu SNS Security White Paper May 2007 Version 1.2 Nixu Software Limited Nixu Group 2 Contents 1 Security Design Principles... 3 1.1 Defense in Depth... 4 1.2 Principle of Least Privilege... 4 1.3 Principle
Securing Remote Desktop for Windows XP
Securing Remote Desktop for Windows XP http://www.mobydisk.com/./techres/securing_remote_desktop.html Remote Desktop, Unsafely Many people use the Windows XP Professional remote desktop feature to gain
Service & Support. How do you create a communication of RDP with an Industrial Thin Client SIMATIC ITC? Thin Client.
Cover How do you create a communication of RDP with an Industrial Thin Client SIMATIC ITC? Thin Client FAQ August 2012 Service & Support Answers for industry. Question This entry is from the Siemens Industry
Security Maintenance Practices. IT 4823 Information Security Administration. Patches, Fixes, and Revisions. Hardening Operating Systems
IT 4823 Information Security Administration Securing Operating Systems June 18 Security Maintenance Practices Basic proactive security can prevent many problems Maintenance involves creating a strategy
Locking down a Hitachi ID Suite server
Locking down a Hitachi ID Suite server 2016 Hitachi ID Systems, Inc. All rights reserved. Organizations deploying Hitachi ID Identity and Access Management Suite need to understand how to secure its runtime
Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses
Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses 2004 Microsoft Corporation. All rights reserved. This document is for informational purposes only.
Virtual Code Authentication User s Guide. June 25, 2015
Virtual Code Authentication User s Guide June 25, 2015 Virtual Code Authentication User s Guide Overview of New Security Modern technologies call for higher security standards as practiced among many other
RemotelyAnywhere. Security Considerations
RemotelyAnywhere Security Considerations Table of Contents Introduction... 3 Microsoft Windows... 3 Default Configuration... 3 Unused Services... 3 Incoming Connections... 4 Default Port Numbers... 4 IP
Manual Password Depot Server 8
Manual Password Depot Server 8 Table of Contents Introduction 4 Installation and running 6 Installation as Windows service or as Windows application... 6 Control Panel... 6 Control Panel 8 Control Panel...
Grandstream Networks, Inc. UCM6100 Security Manual
Grandstream Networks, Inc. UCM6100 Security Manual Index Table of Contents OVERVIEW... 3 WEB UI ACCESS... 4 UCM6100 HTTP SERVER ACCESS... 4 PROTOCOL TYPE... 4 USER LOGIN... 4 LOGIN TIMEOUT... 5 TWO-LEVEL
Global TAC Secure FTP Site Customer User Guide
Global TAC Secure FTP Site Customer User Guide Introduction This guide is provided to assist you in using the GTAC Secure FTP site. This site resides in the Houston Remote Services Center (RSC), and is
Remote Administration
Contents Preparing The Server 2 Firewall Considerations 3 Performing Remote Administration 4 Additional Notes 5 Mobile Application Administration 6 Managing Users In The iphone App 8 Maxum Development
LT Auditor+ 2013. Windows Assessment SP1 Installation & Configuration Guide
LT Auditor+ 2013 Windows Assessment SP1 Installation & Configuration Guide Table of Contents CHAPTER 1- OVERVIEW... 3 CHAPTER 2 - INSTALL LT AUDITOR+ WINDOWS ASSESSMENT SP1 COMPONENTS... 4 System Requirements...
Security Advice for Instances in the HP Cloud
Security Advice for Instances in the HP Cloud Introduction: HPCS protects the infrastructure and management services offered to customers including instance provisioning. An instance refers to a virtual
Summer Webinar Series
Summer Webinar Series Cisco ASA AnyConnect VPN with AD Christopher Rose Sr. Client Network Engineer [email protected] Webinar Links: www.mcnc.org/cne-webinars Agenda Review the security implications of remote
First Steps after Installation Guide
First Steps after Installation Guide Index 1. Login to your IVR 2. License activation 3. Security Recommendations 4. Configure your first SIP extension or device 5. Configure your first SIP trunk 6. Configure
Network Configuration Settings
Network Configuration Settings Many small businesses already have an existing firewall device for their local network when they purchase Microsoft Windows Small Business Server 2003. Often, these devices
Livezilla How to Install on Shared Hosting http://www.jonathanmanning.com By: Jon Manning
Livezilla How to Install on Shared Hosting By: Jon Manning This is an easy to follow tutorial on how to install Livezilla 3.2.0.2 live chat program on a linux shared hosting server using cpanel, linux
A Decision Maker s Guide to Securing an IT Infrastructure
A Decision Maker s Guide to Securing an IT Infrastructure A Rackspace White Paper Spring 2010 Summary With so many malicious attacks taking place now, securing an IT infrastructure is vital. The purpose
M2M Series Routers. Port Forwarding / DMZ Setup
Introduction Port forwarding enables programs or devices running on your LAN to communicate with the internet as if they were directly connected. Many internet services and applications use designated
Accessing the Media General SSL VPN
Launching Applications and Mapping Drives Remote Desktop Outlook Launching Web Applications Full Access VPN Note: To access the Media General VPN, anti-virus software must be installed and running on your
Immotec Systems, Inc. SQL Server 2005 Installation Document
SQL Server Installation Guide 1. From the Visor 360 installation CD\USB Key, open the Access folder and install the Access Database Engine. 2. Open Visor 360 V2.0 folder and double click on Setup. Visor
Running the Tor client on Mac OS X
Running the Tor client on Mac OS X Note that these are the installation instructions for running a Tor client on Mac OS X. If you want to relay traffic for others to help the network grow (please do),
Release Notes for Websense Email Security v7.2
Release Notes for Websense Email Security v7.2 Websense Email Security version 7.2 is a feature release that includes support for Windows Server 2008 as well as support for Microsoft SQL Server 2008. Version
Parallels. for your Linux or Windows Server. Small Business Panel. Getting Started Guide. Parallels Small Business Panel // Linux & Windows Server
Getting Started Guide Parallels Small Business Panel for your Linux or Windows Server Getting Started Guide Page 1 Getting Started Guide: Parallels Small Business Panel, Linux & Windows Server Version
5. At the Windows Component panel, select the Internet Information Services (IIS) checkbox, and then hit Next.
Installing IIS on Windows XP 1. Start 2. Go to Control Panel 3. Go to Add or RemovePrograms 4. Go to Add/Remove Windows Components 5. At the Windows Component panel, select the Internet Information Services
Getting Started With Your Virtual Dedicated Server. Getting Started Guide
Getting Started Guide Getting Started With Your Virtual Dedicated Server Setting up and hosting a domain on your Linux Virtual Dedicated Server using cpanel. Getting Started with Your Virtual Dedicated
Using Internet or Windows Explorer to Upload Your Site
Using Internet or Windows Explorer to Upload Your Site This article briefly describes what an FTP client is and how to use Internet Explorer or Windows Explorer to upload your Web site to your hosting
FIREWALL POLICY November 2006 TNS POL - 008
FIREWALL POLICY November 2006 TNS POL - 008 Introduction Network Security Services (NSS), a department of Technology and Network Services, operates a firewall to enhance security between the Internet and
1 Accessing E-mail accounts on the Axxess Mail Server
1 Accessing E-mail accounts on the Axxess Mail Server The Axxess Mail Server provides users with access to their e-mail folders through POP3, and IMAP protocols, or OpenWebMail browser interface. The server
Spector 360 Deployment Guide. Version 7
Spector 360 Deployment Guide Version 7 December 11, 2009 Table of Contents Deployment Guide...1 Spector 360 DeploymentGuide... 1 Installing Spector 360... 3 Installing Spector 360 Servers (Details)...
How to Access UF Health Jacksonville VPN services
How to Access UF Health Jacksonville VPN services To access VPN services go to the hospital website at http://ufhealthjax.org/. Click on the For Employees link at the bottom of the screen. Under Remote
EIOBoard Intranet Installer Guide
Savance 1111 W. Oakley Park Rd. Ste 103, Commerce Township, MI 48390 Phone: 248-478-2555 Fax: 248-478-3270 www.eioboard.com [email protected] www.savance.com 2013 Table of Contents System Requirements
Contents Minimum Requirements... 2 Instructions... 2 Troubleshooting... 7
Emdeon Remote Desktop Services Contents Minimum Requirements... 2 Instructions... 2 Troubleshooting... 7 Minimum Requirements 1. A high-speed Internet connection. DSL or Cable Internet are recommended.
FileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
Activity 1: Scanning with Windows Defender
Activity 1: Scanning with Windows Defender 1. Click on Start > All Programs > Windows Defender 2. Click on the arrow next to Scan 3. Choose Custom Scan Page 1 4. Choose Scan selected drives and folders
Spector 360 Deployment Guide. Version 7.3 January 3, 2012
Spector 360 Deployment Guide Version 7.3 January 3, 2012 Table of Contents Deploy to All Computers... 48 Step 1: Deploy the Servers... 5 Recorder Requirements... 52 Requirements... 5 Control Center Server
University of Wisconsin System Shared Financial System (SFS) PeopleTools 8.53 Client Setup Guide
University of Wisconsin System Shared Financial System (SFS) PeopleTools 8.53 Client Setup Guide Summary This document will guide you through the process of installing and configuring the PeopleTools 8.53
Customer Control Panel Manual
Customer Control Panel Manual Contents Introduction... 2 Before you begin... 2 Logging in to the Control Panel... 2 Resetting your Control Panel password.... 3 Managing FTP... 4 FTP details for your website...
STATISTICA VERSION 12 STATISTICA ENTERPRISE SMALL BUSINESS INSTALLATION INSTRUCTIONS
STATISTICA VERSION 12 STATISTICA ENTERPRISE SMALL BUSINESS INSTALLATION INSTRUCTIONS Notes 1. The installation of STATISTICA Enterprise Small Business entails two parts: a) a server installation, and b)
User Guide - escan for Linux File Server
1 User Guide - escan for Linux File Server 2 I. Required escan for Linux RPMS / Debian packages RPM Package Name File name mwadmin mwav escan escan-rtm mwadmin-x.x-x..i386.rpm mwav-x.x-x.
Security White Paper The Goverlan Solution
Security White Paper The Goverlan Solution The Goverlan Administration Suite (which includes the following modules: Administration & Diagnostics, Remote Control, Scope Actions, and WMIX) is a powerful
Site Monitor. Version 5.3
Site Monitor Version 5.3 1 1 Table of contents 1 Table of contents... 2 2 Installation... 3 2.1 Components... 3 2.1.1 Monitoring Service... 3 2.1.2 Desktop User Interface... 3 2.1.3 Web User Interface...
Safety and Health Grant Program Database Remote Access Installation Guide
Safety and Health Grant Program Database Remote Access Installation Guide Version 1.01 October 29, 2011 Imagine Nation Software 8223 Yukon Hills Ct. Las Vegas, NV 89178 www.insoftware.net Contact: Michael
CONTENTS. PCI DSS Compliance Guide
CONTENTS PCI DSS COMPLIANCE FOR YOUR WEBSITE BUILD AND MAINTAIN A SECURE NETWORK AND SYSTEMS Requirement 1: Install and maintain a firewall configuration to protect cardholder data Requirement 2: Do not
VPS Hosting. The Guide to Bet Angel VPS. Getting started with Bet Angel VPS. Revised August 2013. Page 1
The Guide to Bet Angel VPS Getting started with Bet Angel VPS Revised August 2013 Page 1 Contents VPS Hosting Connecting to a Windows Server for the first time... 3 1 Ensuring that your Server has been
Cyber Security: An Introduction
Cyber Security: An Introduction Security is always a trade-off between convenience and protection. A good security policy is convenient enough to prevent users from rebelling, but still provides a reasonable
MS Terminal Server Cracking
MS Terminal Server Cracking If you want to do any MS Terminal Server cracking you basically have your choice of three tools that can do it for you; TSgrinder, TScrack, and a patched version of RDesktop.
How to install phpbb forum on NTU student club web server
How to install phpbb forum on NTU student club web server This guide contains the step by step instructions to install phpbb (stable release 3.0.7- PL1) on NTU student club web server. It does not cover
F-SECURE MESSAGING SECURITY GATEWAY
F-SECURE MESSAGING SECURITY GATEWAY DEFAULT SETUP GUIDE This guide describes how to set up and configure the F-Secure Messaging Security Gateway appliance in a basic e-mail server environment. AN EXAMPLE
1. Installation Overview
Quick Install Guide 1. Installation Overview Thank you for selecting Bitdefender Business Solutions to protect your business. This document enables you to quickly get started with the installation of Bitdefender
Remote Administration
Windows Remote Desktop, page 1 pcanywhere, page 3 VNC, page 7 Windows Remote Desktop Remote Desktop permits users to remotely execute applications on Windows Server 2008 R2 from a range of devices over
Windows 7 Hula POS Server Installation Guide
Windows 7 Hula POS Server Installation Guide Step-by-step instructions for installing the Hula POS Server on a PC running Microsoft Windows 7 1 Table of Contents Introduction... 3 Getting Started... 3
Common Cyber Threats. Common cyber threats include:
Common Cyber Threats: and Common Cyber Threats... 2 Phishing and Spear Phishing... 3... 3... 4 Malicious Code... 5... 5... 5 Weak and Default Passwords... 6... 6... 6 Unpatched or Outdated Software Vulnerabilities...
Pearl Echo Installation Checklist
Pearl Echo Installation Checklist Use this checklist to enter critical installation and setup information that will be required to install Pearl Echo in your network. For detailed deployment instructions
Security. TestOut Modules 12.6 12.10
Security TestOut Modules 12.6 12.10 Authentication Authentication is the process of submitting and checking credentials to validate or prove user identity. 1. Username 2. Credentials Password Smart card
Projetex 9 Workstation Setup Quick Start Guide 2012 Advanced International Translations
Projetex 9 Workstation Setup Quick Start Guide 1 Projetex 9 Help Table of Contents Disclaimer 2 System Requirements 2 Registration/Upgrade 3 Projetex Workstation Setup 5 User Login to Projetex Workstation
Server Security. Contents. Is Rumpus Secure? 2. Use Care When Creating User Accounts 2. Managing Passwords 3. Watch Out For Aliases 4
Contents Is Rumpus Secure? 2 Use Care When Creating User Accounts 2 Managing Passwords 3 Watch Out For Aliases 4 Deploy A Firewall 5 Minimize Running Applications And Processes 5 Manage Physical Access
Using TS-ACCESS for Remote Desktop Access
Using TS-ACCESS for Remote Desktop Access Introduction TS-ACCESS is a remote desktop access feature available to CUA faculty and staff who need to access administrative systems or other computing resources
Scan to SMB(PC) Set up Guide
Scan to SMB(PC) Set up Guide Regarding Trade Names Windows is a registered trademark of Microsoft Corporation in the U.S.A. and/or other countries. Windows XP and Windows Vista are trademarks of Microsoft
Installation Instructions
Installation Instructions 25 February 2014 SIAM AST Installation Instructions 2 Table of Contents Server Software Requirements... 3 Summary of the Installation Steps... 3 Application Access Levels... 3
Using Remote Desktop with No-IP
Page 1 of 6 Lost Password? Sign-up Now!. com Support : Guides and Tips : Remote Access : Using Remote Desktop with No-IP Overview The use of Microsoft's Remote Desktop Connection to access another computer
Penetration testing. A step beyond missing patches and weak passwords
Penetration testing A step beyond missing patches and weak passwords June 25 th, 2012 Eirik Thormodsrud Graduated from the ISG in 2006 Employed by Ernst & Young Norway ever since (5 ½ years) Manager at
A D M I N I S T R A T O R V 1. 0
A D M I N I S T R A T O R F A Q V 1. 0 2011 Fastnet SA, St-Sulpice, Switzerland. All rights reserved. Reproduction in whole or in part in any form of this manual without written permission of Fastnet SA
SingTel PowerON Desktop Backup
SingTel PowerON Desktop Backup User Manual Copyright 2011 F-Secure Corporation. All rights reserved. SingTel PowerON Desktop Backup Table of Contents 1. SingTel PowerON Desktop Backup Help... 1 1.1. What
Make a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder.
CMSC 355 Lab 3 : Penetration Testing Tools Due: September 31, 2010 In the previous lab, we used some basic system administration tools to figure out which programs where running on a system and which files
N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work
N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work How Firewalls Work By: Jeff Tyson If you have been using the internet for any length of time, and especially if
Setting Up Your FTP Server
Requirements:! A computer dedicated to FTP server only! Linksys router! TCP/IP internet connection Steps: Getting Started Configure Static IP on the FTP Server Computer: Setting Up Your FTP Server 1. This
Windows Client/Server Local Area Network (LAN) System Security Lab 2 Time allocation 3 hours
Windows Client/Server Local Area Network (LAN) System Security Lab 2 Time allocation 3 hours Introduction The following lab allows the trainee to obtain a more in depth knowledge of network security and
Sophos Computer Security Scan startup guide
Sophos Computer Security Scan startup guide Product version: 1.0 Document date: February 2010 Contents 1 About the software...3 2 What do I need to do?...3 3 Prepare for scanning...3 4 Install the software...4
CCM 4350 Week 11. Security Architecture and Engineering. Guest Lecturer: Mr Louis Slabbert School of Science and Technology.
CCM 4350 Week 11 Security Architecture and Engineering Guest Lecturer: Mr Louis Slabbert School of Science and Technology CCM4350_CNSec 1 Web Server Security The Web is the most visible part of the net
USER GUIDE. Lightweight Directory Access Protocol (LDAP) Schoolwires Centricity
USER GUIDE Lightweight Directory Access Protocol () Schoolwires Centricity TABLE OF CONTENTS Introduction... 1 Audience and Objectives... 1 Overview... 1 Servers Supported by Centricity... 1 Benefits of
WEB SECURITY. Oriana Kondakciu 0054118 Software Engineering 4C03 Project
WEB SECURITY Oriana Kondakciu 0054118 Software Engineering 4C03 Project The Internet is a collection of networks, in which the web servers construct autonomous systems. The data routing infrastructure
McAfee.com Personal Firewall
McAfee.com Personal Firewall 1 Table of Contents Table of Contents...2 Installing Personal Firewall...3 Configuring Personal Firewall and Completing the Installation...3 Configuring Personal Firewall...
LifeCyclePlus Version 1
LifeCyclePlus Version 1 Last updated: 2014-04-25 Information in this document is subject to change without notice. Companies, names and data used in examples herein are fictitious unless otherwise noted.
TAO Installation Guide v0.1. September 2012
TAO Installation Guide v0.1 September 2012 TAO installation guide v0.1 page 2/22 This installation guide provides instructions for installing TAO. For all other aspects of using TAO, please see the user
Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes
Category Question Name Question Text C 1.1 Do all users and administrators have a unique ID and password? C 1.1.1 Passwords are required to have ( # of ) characters: 5 or less 6-7 8-9 Answer 10 or more
SchoolBooking SSO Integration Guide
SchoolBooking SSO Integration Guide Before you start This guide has been written to help you configure SchoolBooking to operate with SSO (Single Sign on) Please treat this document as a reference guide,
Lab 1: Windows Azure Virtual Machines
Lab 1: Windows Azure Virtual Machines Overview In this hands-on Lab, you will learn how to deploy a simple web page to a Web server hosted in Windows Azure and configure load balancing. Objectives In this
Alert Notification of Critical Results (ANCR) Public Domain Deployment Instructions
Alert Notification of Critical Results (ANCR) Public Domain Deployment Instructions Server Prerequisites Internet Information Server (IIS). It may be enabled in Windows Features (see Enabling IIS section).
Five Steps to Improve Internal Network Security. Chattanooga ISSA
Five Steps to Improve Internal Network Security Chattanooga ISSA 1 Find Me AverageSecurityGuy.info @averagesecguy [email protected] github.com/averagesecurityguy ChattSec.org 2 Why? The methodical
HOW TO USE THE File Transfer Protocol SERVER ftp.architekturaibiznes.com.pl
HOW TO USE THE File Transfer Protocol SERVER ftp.architekturaibiznes.com.pl In order to access the A&B server with a view to uploading or downloading materials, any FTP client software can be used. If
Introduction. Just So You Know... PCI Can Be Difficult
Introduction For some organizations, the prospect of managing servers is daunting. Fortunately, traditional hosting companies offer an affordable alternative. Picking the right vendor and package is critial
Simple. Control Panel. for your Linux Server. Getting Started Guide. Simple Control Panel // Linux Server
Getting Started Guide Simple Control Panel for your Linux Server Getting Started Guide Page 1 Getting Started Guide: Simple Control Panel, Linux Server Version 2.1 (02.01.10) Copyright 2010. All rights
Novell Open Workgroup Suite
Novell Open Workgroup Suite Small Business Edition QUICK START GUIDE September 2007 v1.5 Page 1 Introduction This Quick Start explains how to install the Novell Open Workgroup Suite software on a server.
ManageEngine IT360. Professional Edition Installation Guide. [[email protected]]
ManageEngine IT360 (Division of ZOHO Corporation) ) www.manageengine.com/it360 ManageEngine IT360 Professional Edition Installation Guide [[email protected]] [This document is a guideline for installing
