background preloader

IT security

Facebook Twitter

Enable DNS-over-HTTPS (DoH) in your browser. Meltdown et Spectre : tout savoir sur les failles historiques des processeurs. Nous évoquions hier une faille de sécurité dénichée dans tous les processeurs Intel sortis depuis une dizaine d’années.

Meltdown et Spectre : tout savoir sur les failles historiques des processeurs

Il s'agissait déjà d'une faille énorme, mais ce n’était en réalité qu’une petite partie du problème. Puisque l’information est sortie dans la nature plus tôt que prévue, les acteurs impliqués ont fini par communiquer, ce qui nous permet de connaître plus précisément l’étendue des dégâts. Il n’y a pas une faille, mais deux assez similaires.

Si la première, surnommée « Meltdown » pour l’occasion, ne concerne bien que les processeurs Intel, la deuxième, nommée « Spectre », touche cette fois tous les processeurs en circulation depuis plusieurs décennies. Tous, y compris les processeurs ARM que l’on retrouve dans les smartphones et tablettes. Faut-il paniquer pour autant ? Pour faire le point sur ce que l’on sait à l’heure où nous écrivons ces lignes, voici une série de questions et de réponses. Dossier médical partagé : un progrès trop risqué ? Vie privée : 5 outils utilisés et approuvés par Snowden. Introduction to Windows Server 2012 Dynamic Access Control. We constantly strive to reduce the steps required for you to get your job done.

Introduction to Windows Server 2012 Dynamic Access Control

One of the reasons Windows Server 2012 is a such great release is that we spent so much time listening to our customers and understanding their scenarios and concerns. When development teams start from a technology/feature mindset, it can be hard to work across groups because helping another team usually means that you have to give up something you wanted to do. We were able to achieve a very high level of technology integration and cross-group cooperation because we all shared a common understanding of our customers and their scenarios.

Teams were eager to help each other succeed in delivering those scenarios. When you have lots of teams working together towards a common goal, you can really change the game and tackle some really hard problems. Nir Ben-Zvi, a Program Manager on the File Server team, wrote this blog. Container-Based Controls versus Dynamic Authorization: The Difference in Windows Environments (Part 1 of 2) By Sandeep Chopra. If you are debating whether to upgrade to Windows Server 2012, plenty of articles describe its new security benefits (for example, see here and here). Fewer articles discuss the basic shift in Access Management this release can enable. To understand the potential benefits of one key feature, Dynamic Access Control, it’s useful to compare this approach with more well-known models of Access Management, such as ACLs and Security Groups.

Les attaques de circuits intégrés. Terms of Service; Didn't Read. Objective-See. Love these free tools?

Objective-See

Support them via my patreon page! 🙏 In today's connected world, it is rare to find an application or piece of malware that doesn't talk to a remote server. LuLu is the free, open firewall for Macs that can protect your network connections and detect malicious activity. learn more Physical access (or "evil maid") attacks are extremely insidious yet highly efficient. The StationX Cyber Security School - The Best Cyber Security. Cybrary - Online Cyber Security Training, Free, Forever. Sécurité informatique et protection de la vie privée. Network Security & Information Security resource for IT administrators. How to Prevent Users from Changing Permissions on File Servers. On file servers in corporate environments one typically does not want users to change permissions, even on their own files.

How to Prevent Users from Changing Permissions on File Servers

It might seem that it would be sufficient to simply grant change permissions instead of full control, but unfortunately that is not the case. The problem is that whenever a new file gets created, the user creating the file will be its owner. And owners can always change permissions, regardless of the contents of the DACL. The Solution In order to prevent “orderly” users from “tidying” the permissions on their files and directories and thus messing things up, often removing administrators from the DACL, too, the following needs to be done: How to successfully implement the principle of least privilege. ForensicsWiki. Facebook Privacy Basics. Mobile content from Windows IT Pro. Like most technologies that an IT pro deals with, wireless technology changes from day to day.

Mobile content from Windows IT Pro

Not too long ago, having a wireless LAN (WLAN) was considered a mere luxury or something "nice to have. " Nowadays, however, access to a WLAN is critical because the proliferation of mobile devices that have entered our industry invariably tout Wi-Fi as a key selling point. This is even more important as cellular carriers begin to cap their wireless data rate plans; unlimited cellular data plans are all but gone, whereas Wi-Fi is almost always unlimited (and faster). It's important to take stock of your current WLAN infrastructure if you have one, and to be aware of the latest standards if you're designing a new one—even if it consists of only a single Access Point (AP). The Band Played On Almost all discussions of Wi-Fi include at least a mention of spectrum bands—and our discussion is no different. Related: Wi-Fi: Tools to Detect Interference Channel Surfing Security, Not Obscurity 1. 2. 3.

How To Secure Your Wi-Fi Network Against Intrusion. Insecure Wi-Fi is the easiest way for people to access your home network, leech your internet, and cause you serious headaches with more malicious behavior.

How To Secure Your Wi-Fi Network Against Intrusion