LiquidLayer.net | Tech

Forum Home

TitleAuthorPostsLast Post
Feds Bust Alleged 'Crackas With Attitude' LiquidLayer 1 14 daysLiquidLayer (20): Source: Data Breach Today http://www.databreachtoday.com/feds-bust-alleged-crackas-attitude-hackers-a-9389 Feds Bust Alleged 'Crackas With Attitude' Hackers Group Claimed Credit for Dumping CIA Director's AOL Emails Two men allegedly tied to the hacking group "Crackas With Attitude" have been arrested as part of an investigation into hacks against U.S. government systems as well as senior government officials, including CIA...
SonicWALL ATP: Advanced Threat Protection LiquidLayer 1 24 daysLiquidLayer (20): SonicWALL ATP: Advanced Threat Protection 09/02/2016 SonicWALL Capture is a new service offering and some of the key features are below: Capture is a cloud based service and it’s available on Dell SonicWALL firewalls. It revolutionizes advanced threat detection and sandboxing with a multi-engine approach to stopping unknown and zero-day attacks at the gateway and has automated remediation. Customers benefit from high security...
ZixMail Outbound Encryption Type LiquidLayer 1 25 daysLiquidLayer (20): ZixMail Outbound Encryption Type For Zix Mail Users (not using their own Zix Gateway Appliance - the type of encryption used for outbound mail to the Zix Directory is: 1024 / RSA with 168 Triple DES The receiving party - if they are not already Zix Client will be sent to the Zix Portal which is secure be traditional SSL https - same level of security as accessing your bank. If you are a ZixGateway appliance client - Gateway to the...
FortiVoice Tech note: Setup CyberData Paging LiquidLayer 1 1 monthLiquidLayer (20): http://www.fortivoice.com/sites/default/files/productdatasheets/Setting_up_CyberData_speakers_for_paging.pdf Setting up CyberData speakers for paging Confirm FortiVoice Ring/Page Groups The CyberData speaker must be associated with an active ring/page group in order to broadcast pages. To configure the speaker, you will require the port number of the ring/page group or groups that you want to associate with the speaker. Ring/page...
Differnce between Wireless AC and N protocol LiquidLayer 1 2 monthsLiquidLayer (20): AC is a wireless protocol that works in the 5 GHZ Freq. For the most part Beam Forming is the biggest take away --- Here is a snip for a nice write up on Forbes.com That said my experience testing both standards using (N) and (AC), finds very little difference in signal strength between 802.11ac over 5GHz and 802.11n over 5GHz and 2.4GHz. Why? Firstly because 2.4GHz is used for everything from cordless home phones to microwaves and 5GHz...
Lastpass update on Security Threat 07/27/16 LiquidLayer 2 2 monthsLiquidLayer (20): Twitter Feed Post by Tavis Ormandy whom reported this security concern as of 07/28/16: https://twitter.com/taviso/status/758461726945783808
FortiVoice POTS Lines w/ Grandstream GXW4108 LiquidLayer 1 2 monthsLiquidLayer (20): FortiVoice POTS Lines w/ Grandstream GXW4108 See here: https://www.fortivoice.com/sites/default/files/productdatasheets/FortiVoice_grandstream.pdf Fortinet Support (866) 648-4638 Grandstream GXW4108 The Grandstream GXW- Series Analog 8 FXO IP Gateways are designed and tested for full interoperability with leading IP-PBXs, Softswitches and most SIP-based environments. ...
Sonicwall Firewall - SIP Transformations LiquidLayer 1 2 monthsLiquidLayer (20): OnSIP Source Post Revised March 2016 Firewall => Advanced => Scroll down to "UDP": Increase UDP timeout to 120* *if this does not resolve port timeout issues, may need to also modify the Global UDP Connection Timeout: Advanced tab = Firewall => Access Rules => LAN/WAN and increase UDP to 120 to override any inherited UDP timeout rules VOIP => Settings: o Turn on Consistent NAT. o For customers using the...
Barracuda Phone System CudaTel Discontinued LiquidLayer 1 2 monthsLiquidLayer (20): https://community.barracudanetworks.com/forum/index.php?/topic/28196-barracuda-phone-system-discontinued-as-of-july-29th-2016/ Barracuda Phone System CudaTel Discontinued (EOL) Posted Yesterday July 12th, 2016 - 01:39 PM I was recently told today by our Support Manager that Barracuda has indeed decided to stop manufacturing the BPS as of July 29th, 2016. It looks like Doug Penny was correct in his post a few weeks back when the topic...
HotScripts MacForums WebHostingTalk Hacked LiquidLayer 1 3 monthsLiquidLayer (20): http://www.mailedge.net/blog/2016/7/11/databases-from-hot-scripts-mac-forums-web-hosting-talk-surface-on-the-dark-web Almost 1.7 million users affected by latest breaches A hacker who goes by the name of uid0 claims to have breached three websites belonging to Penton Technology: Hot Scripts, Mac Forums, and Web Hosting Talk. The hacker is now selling the data through The Real Deal Dark Web marketplace, like many other hackers have done...
HowTo: Link Balance WANs SonicWALL LiquidLayer 1 3 monthsLiquidLayer (20): SonicOS Enhanced 5.5 and Below: https://support.software.dell.com/kb/sw7588 SonicOS Enhanced 5.6 and Above: See this video by Andrew Crouthamel from Shrike Tools https://youtu.be/3wn9Q_v6MVU |- Video -| • Dell SonicWALL Failover and Load Balancing |-Playlist-| • Dell SonicWALL Training Playlist • Watch the Dell SonicWALL Training playlist! https://www.youtube.com/playlist?list... |-Subscribe-| • Don't forget to...
Will Cyberoam support MAC VPN Clients LiquidLayer 1 3 monthsLiquidLayer (20): Q: Will Cyberoam support MAC VPN Clients A: Default client apps only windows or use Tunnelblick VPN Client - logging into the Cyberoam appliance as a SSL VPN user will provide links to download TunnelBlick or link direct below https://kb.cyberoam.com/default.asp?id=2292 https://tunnelblick.net/ Tunnelblick is a free, open source graphic user interface for OpenVPN on OS X. It provides easy control of OpenVPN client and/or...
Create Certificate Signing Request Online LiquidLayer 2 3 monthsLiquidLayer (20): Go here if you need detailed instructions for multiple platforms / OS environments. https://www.digicert.com/csr-creation.htm Before you can order an SSL Certificate, you must first generate a CSR (Certificate Signing Request) for your server. A CSR is an encoded file that provides you with a standardized way to send us your public key along with some information that identifies your company and domain name. When you generate a CSR,...
What is APT Blocker by Watchguard? LiquidLayer 1 3 monthsLiquidLayer (20): https://www.watchguard.com/wgrd-products/security-modules/apt-blocker Malware is getting more sophisticated by the day and the number of cyberattacks are increasing in an alarming rate. According to a study, cyberattacks were up 48 percent from 2013 to 2014. With government and large companies being no longer the only targets for hackers, protection for small and medium-size business is more important than ever before. Modern malware...
ShoreTel Phone is Unreachable - Communicator LiquidLayer 1 4 monthsLiquidLayer (20): Issue: "Phone is Unreachable" from ShoreTel Communicator VoiceMail Window trying to listen to a VoiceMail Google search will result in a few match's on this issue, However 99% of the postings are a question that never get's answered. Or they are so far fetched, such as: Check your firewall setting. Yikes. Anyway - So this worked for us and at least one other... To Re-Cap: ShoreTel user reports / launching VoiceMail...
SolarWinds acquires LogicNow 06/01/15 LiquidLayer 1 4 monthsLiquidLayer (20): SolarWinds acquires LogicNow 06/01/15 http://pages.logicnow.com/rs/356-UVH-403/images/solarwinds_logo_fullColor-01-01.png LogicNow is the GFI Cloud Services spin off that took place about 2 years ago. Source: Announcement We have some exciting news to share with you. Through an acquisition by SolarWinds, LOGICnow has joined forces with SolarWinds N-able to create SolarWinds MSP. This joining of these teams gives the company...
Ubiquiti Networks Gear Targeted by Worm LiquidLayer 1 4 monthsLiquidLayer (20): Ubiquiti Customers: https://threatpost.com/ubiquiti-networks-gear-targeted-by-worm/118185/ http://community.ubnt.com/t5/airMAX-General-Discussion/Virus-attack-URGENT-UBNT/td-p/1562940 “the worm is exploiting a known vulnerabilities in the AirOS firmware (5.6.2 or older) that was patched early last year. It is urging customers that haven’t already, to update their firmware.” ...
Advantages of H.265 over H.264 Video Streams LiquidLayer 1 5 monthsLiquidLayer (20): The Significant Advantages of H.265 over H.264 http://www.videoconverterfactory.com/tips/h265vsh264.html H. 265 is the new video compression standard after H. 264. Based on the existing video coding standard H. 264, H.265 keeps some of the original technologies, while improves some relevant techniques. H.265 adopts the advanced techniques to improve the bit-stream, promote the coding quality, and better the relationship between time delay...
Protect Browsers from DNS Rebinding Attacks LiquidLayer 1 5 monthsLiquidLayer (20): https://crypto.stanford.edu/dns/ Protecting Browsers from DNS Rebinding Attacks DNS rebinding attacks subvert the same-origin policy and convert browsers into open network proxies. These attacks can circumvent firewalls to access internal documents and services require less than $100 to temporarily hijack 100,000 IP addresses for sending spam and defrauding pay-per-click advertisers For information about defenses, please read our...
SonicWALL NSA 220 Technical Specifications LiquidLayer 1 5 monthsLiquidLayer (20): Dell SonicWALL NSA 220 is End of Life and no longer sold. Also the spec's are no longer published - below are the specs before it was EOL Upgrade your SonicWALL Solution at http://www.SonicGuard.com Technical Specifications Tech Specs Specifications are provided by the manufacturer. Refer to the manufacturer for an explanation of the print speed and other ratings. Capacity Type: Connection / user qty Value:...
New Ransomware will disable your computer! LiquidLayer 1 6 monthsLiquidLayer (20): This new Ransomware is a nasty one as it not only encrypts the data on the hard drive but also the master boot record. The master boot record once encrypted renders that hard drive useless. We have signatures for it and can protect against it (see SonicAlert message below). Here is also a great KB article on how to protect against Ransomwares. Best Practices to protect against CryptoWall and CryptoLocker (SW12434) ...
Spotflux "Waiting for Service" Fix LiquidLayer 1 6 monthsLiquidLayer (20): https://s3.amazonaws.com/groovehq/uploaded/gnohBSzdznMC2TJcvdMV?1432928150 The Spotflux Client shows "Waiting for Service" and never connects The "Waiting for Service" status indicates that the Spotflux Agent is unable to contact the Spotflux Connection Manager on your local machine. The Spotflux Connection Manager is responsible for establishing the connection to our servers. If you see this message, please check...
FortiVoice VoIP Phone Systems Admin Training LiquidLayer 1 6 monthsLiquidLayer (20): FortiVoice VoIP Phone Systems Admin Training See the following two links for all resources needed to setup and maintain a FortiVoice Phone System from Fortinet The Cookbook ! http://cookbook.fortinet.com/fortivoice-enterprise FortiVoice Systems / Documentation - Specification Guides http://www.fortivoice.com/support/documentation ---------------------------- Small Business Web Hosting Liquid Layer Networks ...
Power over Ethernet (POE) Explained Part 1&2 LiquidLayer 1 7 monthsLiquidLayer (20): Source: http://www.veracityglobal.com/resources/articles-and-white-papers/poe-explained-part-1.aspx Part 1 - An Introduction to POE What is Power over Ethernet? Power over Ethernet (POE) is a technology that lets network cables carry electrical power. For example, a digital security camera normally requires two connections to be made when it is installed: A network connection, in order to be able to communicate with video...
4 types of wired headset connectors LiquidLayer 3 8 monthsLiquidLayer (20): Plantronics S12 Telephone Headset System Quick Start User Guide https://www.plantronics.com/us/media/media-resources/literature/user_guides/s12_ug_eng.pdf
Master Browser in a Windows Workgroup LiquidLayer 1 8 monthsLiquidLayer (20): How to Determine the Master Browser in a Windows Workgroup Here’s a little problem that drove me crazy: How do you determine the Master Browser in a Windows Workgroup? First of all, lemme explain a bit about how a workgroup works. When you have a LAN set up running Windows machines, each machine can see all the others in Network Neighborhood (or just “Network” in Vista). If you want to see the files on another machine, you just go to...
Setup Ruckus Wireless Unleashed Config Help LiquidLayer 1 9 monthsLiquidLayer (20): *** STOP and Read (RTFM) When you buy a technology product "support" does not mean / call them right away and say / I have the product, now walk me thru what I do next. :(|) Support is "Break Fix" and do not get "offended" if you are instructed to review the documentation, as you should be doing anyway .... :cool: Review the setup documentation below / and if you have questions or something is not working...
Tawk.to Web Site Visitor Chat FREE LiquidLayer 1 9 monthsLiquidLayer (20): https://www.tawk.to https://www.tawk.to/wp-content/uploads/2014/03/tawkchat.png Message Your Visitors in Real Time tawk.to is a free messaging app that lets you monitor and chat with visitors on your website or from a free customizable page You never have to pay for live chat software again Tired of paying a monthly subscription 'per agent'? Well you can officially cancel your current subscription, as tawk.to is completely free...
Malware for sale! LiquidLayer 1 9 monthsLiquidLayer (20): Malware for sale! Malware exploit kits are easy to buy and simple to use. Attackers of any skill level can obtain them and generate new threats to attack you. Trustwave research found these attacks are increasingly common because they can yield more than a 1,400% ROI for cybercriminals. Spend a few minutes to learn about the drivers that put malware everywhere. View our infographic to see the trends in how much malware appears as a...
(We'll be ready soon) Windows 10 Blue Screen LiquidLayer 2 9 monthsTerryoke (20): Thank you for posting this. I too went through the exact thought process and even thought of the word 'creepy'. Too funny! I followed Amber's advice and got back in after waiting 25 mins. What the heck is Microsoft up to now?
Xima ChroniCall Report Definitions ShoreTel LiquidLayer 1 10 monthsLiquidLayer (20): Xima ChroniCall Report Definitions for ShoreTel Reporting Agent Report Fields Abandoned Calls - Shows the number of inbound calls associated with the given agent that did not end in a Talking or Voicemail event. These are calls that entered the system but were ended prematurely by the calling party. Agent Do Not Disturb Duration - Shows the total, maximum, minimum, or average block of time the specified agent spent in Do Not Disturb...
SonicWALL Virtual Access Point (VAP) Config LiquidLayer 1 10 monthsLiquidLayer (20): http://thebeagle.itgroove.net/2012/07/24/sonicwall-virtual-access-point-vap-configuration/ This blog post is from July 2012, but still provides a good understanding including screen shots about the correct use case of Dell SonicWALL VAP services So, just what is a VAP anyway? In Sonicwall terms as VAP is a security profile and access point configuration that is overlaid on top of a physical Sonicpoint access point OR on top of the...
Dell SonicWALL Import Settings Matrix LiquidLayer 1 11 monthsLiquidLayer (20): Can I Import the settings from one sonicwall UTM device to another? (Support Matrix) (SW6974) Title Can I Import the settings from one sonicwall UTM device to another? (Support Matrix) Resolution Article Applies To: Firmware/Software Version: All SonicOS Enhanced firmware Services: Support Matrix for Importing Preferences. Support Matrix for Importing Preferences from:- 1. Gen5 to Gen6 Products: Note: Upgrading from...
T-Mobile Data Breach: 10/01/2015 LiquidLayer 1 1 yearLiquidLayer (20): LifeLock notifies you of publicly reported large scale data breaches and stolen online credentials. While we have not detected a breach of your information, we found a data breach you may want to review. Data Breach Summary Organization T-Mobile Date(s) of breach Sept. 1, 2013 - Sept. 16, 2015 Date made public Oct. 1, 2015 # of records affected 15M Data compromised Name, Date of Birth, Social Security Number, Address, Identification...
Dell SonicWALL Knowledge Base LiquidLayer 1 1 yearLiquidLayer (20): Dell SonicWALL Knowledge Base The Knowledge Base allows you to search by queries containing unique keywords, symptoms or details, filter results, view, rate, email and print articles - select your product below to see more. Knowledge Base is your single source to search all product information Its the first place Dell Software Support engineers go when assisting our customers ...
VirusTotal | Analyzes Files and URLs LiquidLayer 2 1 yearLiquidLayer (20): Frequently Asked Questions https://www.virustotal.com/en/faq/ Answers to common VirusTotal related questions can be found under the topics listed below. Should you have a question that is not present in this FAQ please do not hesitate to contact us with your inquiry. Before asking please make sure it has not been answered in this FAQ or in any of the pertinent VirusTotal documentation sites. Navigate directly to questions...
FireEye Email Threat Prevention | cloud LiquidLayer 1 1 yearLiquidLayer (20): Published on Jan 25, 2014 Cloud-based platform that identifies, analyzes, and blocks email attacks / Including ZERO DAY Attacks as well helping with prevention of The CryptoLocker MalWare social engineering file locking | Ransom Attacks. Learn about FireEye Email Threat Prevention -- a cloud-based platform that protects against today's advanced email attacks. With no hardware or software to install, customers can quickly and easily...
Requirements for ShoreTel IP Phone 480 LiquidLayer 1 1 yearLiquidLayer (20): Min release for ShoreTel IP Phones 480 / 480g / 485g as well as other new features noted within the ShoreTEL 14.2 Release Notes / see link for PDF download 14.2 Release Notes Supports 400 Series IP Phones File-Based Music On Hold Softphone For Mac New Diagnostic Monitoring with Packet Capture (see video) IP 930D Wireless Handset Enhancements Download attachments: shoretel_14.2_release_notes.pdf ...
Cryptolocker: How to avoid ransom malware LiquidLayer 3 1 yearLiquidLayer (20): From Krebs on Security http://krebsonsecurity.com/2013/11/how-to-avoid-cryptolocker-ransomware/ Over the past several weeks, a handful of frantic Microsoft Windows users have written in to ask what they might do to recover from PC infections from “CryptoLocker,” the generic name for an increasingly prevalent and nasty strain of malicious software that encrypts your files until you pay a ransom. Unfortunately, the answer for these folks...
Heimdal Security - Prevent Cryptolocker LiquidLayer 1 1 yearLiquidLayer (20): Review: Heimdal Security Agent Posted by Willy Sudiarto Raharjo at Saturday, December 10, 2011 For those who have seen Thor, you might recognize Heimdal, which was described as the guardian for the Asgard. He watched for any attacks that might threaten Asgard and plays important role to prevent that. Heimdal Security Agent, a product developed by CSIS Security Group A/S named after a Norse god which has the same name (Heimdal in Thor was...
Difference Between PoE: 802.3at vs 802.3af LiquidLayer 1 1 yearLiquidLayer (20): IEEE 802.3at PoE+ standard provides up to 25.5W IEEE 802.3af PoE standard provides up to 12.95W Source: http://blog.antaira.com/poe-802-3at-vs-802-3af/ Power over Ethernet or PoE is a technology that provides both electrical power and data transmission to remote devices, such as IP phones or cameras, over standard Ethernet CAT5 cabling. PoE devices can be placed in remote locations eliminating the need for power outlets, allowing greater...
Peplink Wireless Guest Network Configuration LiquidLayer 1 1 yearLiquidLayer (20): Consider Peplink 305 and above: Not listed in the compare matrix / god know why - Peplink 305 and above support Guest Protect Example Question: I have an AP One AC mini being controlled from a Balance 30. I can't seem to create an SSID that will enable me to isolate connected Wireless Clients from the LAN. LAN is 192.168.4.xxx I have checked the "Layer 2 Isolation" checkbox on the Balance30, but I still can connect to...
RIG 3.0 malware attack – via Web Browsing LiquidLayer 2 1 yearLiquidLayer (20): This is due to the complicated dynamic bidding system that ad networks employ, where in real time the bid for the ad to be displayed can be bounced across multiple providers until it's matched with the appropriate price. The criminals leverage this situation to serve malicious ads, or malvertisements, from low-profile ad providers down the bidding chain. Eventually when the user is already infected, for example with ransomware, it will be...
SonicWALL HowTo: Configure Transparent Mode LiquidLayer 1 1 yearLiquidLayer (20): Couple of resources below / Tech Note + Video Configuring an Interface (LAN, DMZ, etc.) in Transparent Mode in SonicOS Enhanced (SW5979) https://support.software.dell.com/kb/sw5979 Walk Though – How to configure an interface in Transparent Mode by Dell SonicWall https://youtu.be/JJO1rXgHp1g https://youtu.be/JJO1rXgHp1g Business Grade Web Hosting for the cost of Starbucks Coffee Liquid Layer Networks | Performance Cloud...
Comic Con Sues Comic Con LiquidLayer 1 1 yearLiquidLayer (20): See post on HartKingLaw.com Comic Con Sues Comic Con Jul 30, 2015 | David Baker | Blog If you were one of the 160,000 people lucky enough to score passes to San Diego Comic Con earlier this month, then you already understand the scope of the madness that engulfs the city and takes over the downtown Convention Center every July. Whether you go because you enjoy comic books, you hope to see your favorite actor previewing a new sci-fi...
Fortinet Cookbook - Tips Tricks HowTo LiquidLayer 3 1 yearLiquidLayer (20): Fortinet FortiOS Handbook http://docs-legacy.fortinet.com/fos50hlp/50/connect/Fortinet_Logo_sm.png http://docs-legacy.fortinet.com/fos50hlp/50/index.html#page/FortiOS%25205.0%2520Help/phase1.111.01.html Also Choosing the IKE version If you create a route-based VPN, you have the option of selecting IKE version 2. Otherwise, IKE version 1 is used. IKEv2, defined in RFC 4306, simplifies the negotiation process that creates the...
APT3 Phishing Campaign Clandestine Wolf LiquidLayer 1 1 yearLiquidLayer (20): Operation Clandestine Wolf – Adobe Flash Zero-Day in APT3 Phishing Campaign See source via the FireEye Threat Research In June, FireEye’s FireEye as a Service team in Singapore uncovered a phishing campaign exploiting an Adobe Flash Player zero-day vulnerability (CVE-2015-3113). The attackers’ emails included links to compromised web servers that served either benign content or a malicious Adobe Flash Player file that exploits...
Semalt - Who are they? LiquidLayer 2 1 yearLiquidLayer (20): How to blog semalt .... Source: Forthea.com What is SEMALT? If you haven’t seen it already in your referral traffic, trust me it’s there. SEMAlt purports itself to be a “a professional webmaster analytics tool that opens the door to new opportunities for the market monitoring, yours and your competitors’ positions tracking and comprehensible analytics business information.” What is it really? You’ll get various opinions as you...
Dell Sonicwall NSA 3500 Technical Specs LiquidLayer 1 1 yearLiquidLayer (20): Dell SonicWALL NSA 3500 - security appliance SONICWALL Mfg. Part: 01-SSC-8675 http://www.evisionsys.com/gfx/model-front_NSA3500.jpg Technical Specifications Performance Type: Firewall throughput Value: 1 Gbps Type: VPN throughput (3DES/AES) Value: 650 Mbps Type: Intrusion prevention throughput Value: 220 Mbps Type: Gateway anti-virus throughput Value: 310...
Dell Sonicwall NSA 240 Specs LiquidLayer 1 1 yearLiquidLayer (20): EOL and EOS Dell Sonicwall appliances will "not" list or publish specs for their hardware. We find that all too often you "need" to know the prior specs. So anytime we find them we will post here on LiquidLayer.net's Tech Blog www.LiquidLayer.net) Learn more about the Dell SonicWALL 01-SSC-8756 Model Brand SONICWALL Series NSA 240 Model 01-SSC-8756 SPEC Type ...
destitute