• backdoor.tidserv inf removal from Windows XP

    What's the best way to remove backdoor.tidserv inf from XP?

    Reggies90 pointsBadges:
  • Command to open a local backdoor

    What's the command that needs to be entered to open a local backdoor (server mode) which listens on Port 2380 for incoming connections

    hemant785 pointsBadges:
  • shdocpv.dll – virus – hijack problem

    Hi, I'm sorry if I had chosen the wrong recipient. I am running Windows 2000. When I open my browser (IE 6.0) I get this:res://shdocpv.dll/blank.htmOrres://C:WinntSystem32shdocpv.dllsecurity.htm Please help me to get rid of this. Thanks!

    CUser020 pointsBadges:
  • Data vs. perimeter vs. network security

    A short time ago, author Wes Noonan wrote some tips for SearchWindowsSecurity.com about deperimeterization. He explained how security is always pitted against business needs, and perimeters have become porous because businesses require traffic from SMTP, HTTP or VPNs to pass through the firewall....

    RobynLorusso230 pointsBadges:
  • Unknown Threats

    Apart from honeypots, what are the different methods to find unknown threats which are prevalent? How do I find methods to mitigate them. PS: all the vulnerabilities are known to all the n/w administrators and then can take measures to mitigate attacks but this doesn't happen..Hackers are at least...

    Czarleo0 pointsBadges:
  • Manipulation Engine Definition

    Hi all! I've read the term "manipulation engine" (related to passwords) in a couple of papers but aside from guessing could not find a proper definition of it (not even in this website !!!). Can anyone please redirect me to / provide a clear definition of this term, related to "Security"? Many...

    DiegoDH275 pointsBadges:
  • End-user awareness education for company newsletter

    I have been given the task of developing user awareness 1-pager fact sheets to be distributed on a monthly basis in our company newsletter and posted on our intranet. I can write these from scratch but was hoping not to have to reinvent the wheel. Help?

    CalendarGirl0 pointsBadges:
  • trojan horse downloader

    hi i have a win NT4.0 sp6 server.its a DNS and web server. from few days the IE was redirecting the sites to some search engines.when i scaned with AVG it detected some trojan horse downloader.i healed the trojan and restarted the DNS.the problem was solved.but after some hours the problem arise...

    Redrose0 pointsBadges:
  • Tidserv request 2 attack: Virus or malware?

    Norton is giving me a message saying a tidserv request2 was block, is this a virus or malware infection?

    Reggies90 pointsBadges:
  • Your turn to speak: Is a new Obama mandate putting IT security at risk?

    Yesterday, we told you about a mandate currently being drafted that plans to extend mandatory wiretapping to the Internet. We've received a good amount of feedback from members, including Gordon, who thinks the law would be "overkill...It will open up a can of worms to all the hackers and black...

    MelanieYarbrough6,345 pointsBadges:
  • Network Connection Freezes

    For some reason, at random, among 20 PCs on my network, in the morning or during the day, the network connection stops responding for both intranet and internet communications. The only solution thus far is to remove the NIC from the Device Manager, reboot the PC, and let Windows XP Pro find the...

    DboiSOBE0 pointsBadges:
  • Best practices involving admin rights for user on user system

    We are currently in the middle of figuring out the approach we are going to take in regard to a user having admin rights on their system. Typcially we set up a new user as an administrator on their system when they are logged into the domain. They don't have a local admin account on the system,...

    Kevins740 pointsBadges:
  • Found Trojan.ByteVerify on my computer

    Hi All, Symantec recently discovered Trojan.ByteVerify on my computer. I run system checks weekly and am always cautious about the e-mails I open, the web sites I go to and what I click on, so I was pretty surprised to find I had a Trojan. It was quarantined and removed, but I'm worried about what...

    jwise41020 pointsBadges:
  • Cross-site scripting attacks

    I'm looking for advice on cross-site scripting. What can these attacks do and what can I do to protect Web sites/applications against them? Are there any resources you recommend? Thanks

    Kit1230 pointsBadges:
  • Dos attack

    I have been receiving security alert messages from our firewall nearly everyday. e.g TCP Packet - Source:144.120.8.89,39341 Destination:192.168.1.1,25 - [DOS] TCP Packet - Source:210.7.0.36,3473 Destination:210.7.12.23,135 - [DOS] Thu, 2006-10-19 16:30:03 - UDP Packet -...

    92220990 pointsBadges:
  • Infected with backdoor.tidserv

    My Dell laptop is infected with backdoor.tidserv Has anyone been successful removing this? I cannot disable system restore as Symantec recommends.

    Margaret Rouse1,900 pointsBadges:
  • Penetration Testing.

    Hi!! Good Morning. I have a simple question for you today. I intend to have a penetration testing done for all of my 3 sites - My US Office, My India Office & My US Datacenter. Can you suggest any trustworthy site which can offer me a free reliable scan? Also, I would like to have you suggestion on...

    Nileshroy0 pointsBadges:
  • FU_RootKit.B – need removal

    I believe that a user at my company has gotten a RootKit installed on her laptop. Research on the Internet particularly at http://sandbox.norman.no/live_2.html?logfile=810935 leads me to think that the malware is an updated version of the FU_RootKit. I say updated because the registry keys and...

    EricHarris0 pointsBadges:
  • Procedures for a new area.

    We are a company where we have expirience on network remote administration and now we have open a new area, The area of security. Now I need to start to make new procedures like when a new customer come to us and ask if we can handle the security for his network... I need to know if some one can...

    Millan0 pointsBadges:
  • Paranoid about protecting my MAC address–Please read my story

    What is the easiest way to protect your MAC address against spoofing? In 2004 I was the victim of a hacker that somehow spoofed my Cable Modem Mac address and used it to cover his identity while serving copyright material thru the internet. I was unsuspecting until my ISP one day suspended my...

    DonBlake0 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following