LiquidLayer.net | Tech

Forum Home

TitleAuthorPostsLast Post
Global Cybercriminal Network Shutdown LiquidLayer 1 3 daysLiquidLayer (20): Read the full store here: http://www.databreachtoday.com/police-shut-down-global-cybercriminal-fraud-service-a-9572 Police Shut Down Global Cybercriminal Fraud Service 'Avalanche' Provided Support for Malware Distribution Law enforcement officials in the U.S., Europe and Asia say they've dismantled a resilient network rented by cybercriminals in order to infect tens of millions of computers with code that stole bank account details and...
Howto Exclude a computer from SonicWall CFS LiquidLayer 1 7 daysLiquidLayer (20): https://support.sonicwall.com/kb/sw6617 UTM - CFS: How to exclude a computer from SonicWALL Content Filtering Service (CFS) (SW6617) Title UTM - CFS: How to exclude a computer from SonicWALL Content Filtering Service (CFS) Resolution Article Applies To: Affected SonicWALL Security Appliance Platforms: Gen5: NSA E7500, NSA E6500, NSA E5500, NSA 5000, NSA 4500, NSA 3500, NSA 2400, NSA 240 Gen4: PRO series: PRO 5060,...
Inside the Sony Breach LiquidLayer 1 13 daysLiquidLayer (20): Inside the Sony Breach Novetta CEO LaMontagne on Lessons Learned from the Attack Read the full story and Video Interview here: http://www.databreachtoday.com/interviews/inside-sony-breach-i-3247 Security vendor Novetta recently led an independent investigation into the 2014 Sony breach. What lessons were learned, and how do they apply to today's threat landscape? Novetta's Peter LaMontagne shares key findings. Operation...
Symantec Acquires LifeLock 2.3 Billion LiquidLayer 1 13 daysLiquidLayer (20): Symantec to Acquire LifeLock for $2.3 Billion Security Vendor Looks for New Areas of Growth Read the full story here: http://www.databreachtoday.com/symantec-to-acquire-lifelock-for-23-billion-a-9553 The move will give Symantec an offering in a market area that it hasn't successfully tapped: the estimated one in four Americans that have been hit with identity theft-related fraud. Symantec, a stalwart of the security industry, for...
The Truth: Shingles is Contagious! LiquidLayer 1 1 monthLiquidLayer (20): http://www.symptomfind.com/diseases-conditions/how-contagious-shingles-virus-transmitted/ Another example of the Media covering up the real reason why and how you get the Shingles Virus - I have seen it multiple times where people who have it telling people around them - Don't worry it is NOT Contagious. I have seen it first hand where someone got Shingles and every person around their cube 2 to 3 others soon after got Shingles - why? Read on...
WiFi-2 WebWhip Long-Range Wi-Fi Receiver LiquidLayer 1 1 monthLiquidLayer (20): http://shakespeare-ce.com/marine/product/wifi-2-webwhip-long-range-wi-fi-receiver/ WiFi-2 WebWhip Long-Range Wi-Fi Receiver Long-Range Wi-Fi Receiver If you ever get a call from someone who says they want an antenna to pickup open Wifi Hotspots (get free access to the internet in a nuttshell) .... See this product. Two calls today / thinking they could use any antenna to access free wifi hotpots - this is a purpose built solution runs...
SonicWALL TZ 210 Physical Specs LiquidLayer 1 2 monthsLiquidLayer (20): General Authentication Method Active Directory, Extensible Authentication Protocol (EAP), LDAP, RADIUS, X.509 certificates, XAUTH authentication Manufacturer Dell, Inc. Camera Installed Size 32 MB Power Device Nominal Voltage AC 120/230 V Frequency Required 50/60 Hz Power Consumption Operational 11.7 Watt Modem Antenna Qty 3 Networking Remote...
Watchguard PCI Security Requirements LiquidLayer 1 2 monthsLiquidLayer (20): Watchguard PCI Security Requirements White Paper https://www.watchguard.com/docs/whitepaper/wg_pci-summary_wp.pdf See suggested requirement bullet 11 “Included in this requirement is the need to use an Intrusion Prevention Service in the network.” DLP may not be needed or they can opt in for it just in case ( DLP would be outbound protection ) VS IPS is inbound threat signature blocking – which is part of a PCI scan...
Yahoo Faces Lawsuits Over Breach LiquidLayer 1 2 monthsLiquidLayer (20): Source DataBreachToday.com Several civil lawsuits have been filed against Yahoo following a disclosure that 500 million accounts were compromised in what the company claims was a state-sponsored intrusion in late 2014 - one of the largest-ever data breaches. The quick filing of lawsuits has become a ritual after a major data breach. But such lawsuits often are not successful, and an ambiguous Supreme Court ruling that was hoped would...
Feds Bust Alleged 'Crackas With Attitude' LiquidLayer 1 3 monthsLiquidLayer (20): Source: Data Breach Today http://www.databreachtoday.com/feds-bust-alleged-crackas-attitude-hackers-a-9389 Feds Bust Alleged 'Crackas With Attitude' Hackers Group Claimed Credit for Dumping CIA Director's AOL Emails Two men allegedly tied to the hacking group "Crackas With Attitude" have been arrested as part of an investigation into hacks against U.S. government systems as well as senior government officials, including CIA...
SonicWALL ATP: Advanced Threat Protection LiquidLayer 1 3 monthsLiquidLayer (20): SonicWALL ATP: Advanced Threat Protection 09/02/2016 SonicWALL Capture is a new service offering and some of the key features are below: Capture is a cloud based service and it’s available on Dell SonicWALL firewalls. It revolutionizes advanced threat detection and sandboxing with a multi-engine approach to stopping unknown and zero-day attacks at the gateway and has automated remediation. Customers benefit from high security...
ZixMail Outbound Encryption Type LiquidLayer 1 3 monthsLiquidLayer (20): ZixMail Outbound Encryption Type For Zix Mail Users (not using their own Zix Gateway Appliance - the type of encryption used for outbound mail to the Zix Directory is: 1024 / RSA with 168 Triple DES The receiving party - if they are not already Zix Client will be sent to the Zix Portal which is secure be traditional SSL https - same level of security as accessing your bank. If you are a ZixGateway appliance client - Gateway to the...
FortiVoice Tech note: Setup CyberData Paging LiquidLayer 1 4 monthsLiquidLayer (20): http://www.fortivoice.com/sites/default/files/productdatasheets/Setting_up_CyberData_speakers_for_paging.pdf Setting up CyberData speakers for paging Confirm FortiVoice Ring/Page Groups The CyberData speaker must be associated with an active ring/page group in order to broadcast pages. To configure the speaker, you will require the port number of the ring/page group or groups that you want to associate with the speaker. Ring/page...
Differnce between Wireless AC and N protocol LiquidLayer 1 4 monthsLiquidLayer (20): AC is a wireless protocol that works in the 5 GHZ Freq. For the most part Beam Forming is the biggest take away --- Here is a snip for a nice write up on Forbes.com That said my experience testing both standards using (N) and (AC), finds very little difference in signal strength between 802.11ac over 5GHz and 802.11n over 5GHz and 2.4GHz. Why? Firstly because 2.4GHz is used for everything from cordless home phones to microwaves and 5GHz...
Lastpass update on Security Threat 07/27/16 LiquidLayer 2 4 monthsLiquidLayer (20): Twitter Feed Post by Tavis Ormandy whom reported this security concern as of 07/28/16: https://twitter.com/taviso/status/758461726945783808
FortiVoice POTS Lines w/ Grandstream GXW4108 LiquidLayer 1 5 monthsLiquidLayer (20): FortiVoice POTS Lines w/ Grandstream GXW4108 See here: https://www.fortivoice.com/sites/default/files/productdatasheets/FortiVoice_grandstream.pdf Fortinet Support (866) 648-4638 Grandstream GXW4108 The Grandstream GXW- Series Analog 8 FXO IP Gateways are designed and tested for full interoperability with leading IP-PBXs, Softswitches and most SIP-based environments. ...
Sonicwall Firewall - SIP Transformations LiquidLayer 1 5 monthsLiquidLayer (20): OnSIP Source Post Revised March 2016 Firewall => Advanced => Scroll down to "UDP": Increase UDP timeout to 120* *if this does not resolve port timeout issues, may need to also modify the Global UDP Connection Timeout: Advanced tab = Firewall => Access Rules => LAN/WAN and increase UDP to 120 to override any inherited UDP timeout rules VOIP => Settings: o Turn on Consistent NAT. o For customers using the...
Barracuda Phone System CudaTel Discontinued LiquidLayer 1 5 monthsLiquidLayer (20): https://community.barracudanetworks.com/forum/index.php?/topic/28196-barracuda-phone-system-discontinued-as-of-july-29th-2016/ Barracuda Phone System CudaTel Discontinued (EOL) Posted Yesterday July 12th, 2016 - 01:39 PM I was recently told today by our Support Manager that Barracuda has indeed decided to stop manufacturing the BPS as of July 29th, 2016. It looks like Doug Penny was correct in his post a few weeks back when the topic...
HotScripts MacForums WebHostingTalk Hacked LiquidLayer 1 5 monthsLiquidLayer (20): http://www.mailedge.net/blog/2016/7/11/databases-from-hot-scripts-mac-forums-web-hosting-talk-surface-on-the-dark-web Almost 1.7 million users affected by latest breaches A hacker who goes by the name of uid0 claims to have breached three websites belonging to Penton Technology: Hot Scripts, Mac Forums, and Web Hosting Talk. The hacker is now selling the data through The Real Deal Dark Web marketplace, like many other hackers have done...
HowTo: Link Balance WANs SonicWALL LiquidLayer 1 5 monthsLiquidLayer (20): SonicOS Enhanced 5.5 and Below: https://support.software.dell.com/kb/sw7588 SonicOS Enhanced 5.6 and Above: See this video by Andrew Crouthamel from Shrike Tools https://youtu.be/3wn9Q_v6MVU |- Video -| • Dell SonicWALL Failover and Load Balancing |-Playlist-| • Dell SonicWALL Training Playlist • Watch the Dell SonicWALL Training playlist! https://www.youtube.com/playlist?list... |-Subscribe-| • Don't forget to...
Will Cyberoam support MAC VPN Clients LiquidLayer 1 5 monthsLiquidLayer (20): Q: Will Cyberoam support MAC VPN Clients A: Default client apps only windows or use Tunnelblick VPN Client - logging into the Cyberoam appliance as a SSL VPN user will provide links to download TunnelBlick or link direct below https://kb.cyberoam.com/default.asp?id=2292 https://tunnelblick.net/ Tunnelblick is a free, open source graphic user interface for OpenVPN on OS X. It provides easy control of OpenVPN client and/or...
Create Certificate Signing Request Online LiquidLayer 2 6 monthsLiquidLayer (20): Go here if you need detailed instructions for multiple platforms / OS environments. https://www.digicert.com/csr-creation.htm Before you can order an SSL Certificate, you must first generate a CSR (Certificate Signing Request) for your server. A CSR is an encoded file that provides you with a standardized way to send us your public key along with some information that identifies your company and domain name. When you generate a CSR,...
What is APT Blocker by Watchguard? LiquidLayer 1 6 monthsLiquidLayer (20): https://www.watchguard.com/wgrd-products/security-modules/apt-blocker Malware is getting more sophisticated by the day and the number of cyberattacks are increasing in an alarming rate. According to a study, cyberattacks were up 48 percent from 2013 to 2014. With government and large companies being no longer the only targets for hackers, protection for small and medium-size business is more important than ever before. Modern malware...
ShoreTel Phone is Unreachable - Communicator LiquidLayer 1 6 monthsLiquidLayer (20): Issue: "Phone is Unreachable" from ShoreTel Communicator VoiceMail Window trying to listen to a VoiceMail Google search will result in a few match's on this issue, However 99% of the postings are a question that never get's answered. Or they are so far fetched, such as: Check your firewall setting. Yikes. Anyway - So this worked for us and at least one other... To Re-Cap: ShoreTel user reports / launching VoiceMail...
SolarWinds acquires LogicNow 06/01/15 LiquidLayer 1 6 monthsLiquidLayer (20): SolarWinds acquires LogicNow 06/01/15 http://pages.logicnow.com/rs/356-UVH-403/images/solarwinds_logo_fullColor-01-01.png LogicNow is the GFI Cloud Services spin off that took place about 2 years ago. Source: Announcement We have some exciting news to share with you. Through an acquisition by SolarWinds, LOGICnow has joined forces with SolarWinds N-able to create SolarWinds MSP. This joining of these teams gives the company...
Ubiquiti Networks Gear Targeted by Worm LiquidLayer 1 7 monthsLiquidLayer (20): Ubiquiti Customers: https://threatpost.com/ubiquiti-networks-gear-targeted-by-worm/118185/ http://community.ubnt.com/t5/airMAX-General-Discussion/Virus-attack-URGENT-UBNT/td-p/1562940 “the worm is exploiting a known vulnerabilities in the AirOS firmware (5.6.2 or older) that was patched early last year. It is urging customers that haven’t already, to update their firmware.” ...
Advantages of H.265 over H.264 Video Streams LiquidLayer 1 7 monthsLiquidLayer (20): The Significant Advantages of H.265 over H.264 http://www.videoconverterfactory.com/tips/h265vsh264.html H. 265 is the new video compression standard after H. 264. Based on the existing video coding standard H. 264, H.265 keeps some of the original technologies, while improves some relevant techniques. H.265 adopts the advanced techniques to improve the bit-stream, promote the coding quality, and better the relationship between time delay...
Protect Browsers from DNS Rebinding Attacks LiquidLayer 1 7 monthsLiquidLayer (20): https://crypto.stanford.edu/dns/ Protecting Browsers from DNS Rebinding Attacks DNS rebinding attacks subvert the same-origin policy and convert browsers into open network proxies. These attacks can circumvent firewalls to access internal documents and services require less than $100 to temporarily hijack 100,000 IP addresses for sending spam and defrauding pay-per-click advertisers For information about defenses, please read our...
SonicWALL NSA 220 Technical Specifications LiquidLayer 1 8 monthsLiquidLayer (20): Dell SonicWALL NSA 220 is End of Life and no longer sold. Also the spec's are no longer published - below are the specs before it was EOL Upgrade your SonicWALL Solution at http://www.SonicGuard.com Technical Specifications Tech Specs Specifications are provided by the manufacturer. Refer to the manufacturer for an explanation of the print speed and other ratings. Capacity Type: Connection / user qty Value:...
New Ransomware will disable your computer! LiquidLayer 1 8 monthsLiquidLayer (20): This new Ransomware is a nasty one as it not only encrypts the data on the hard drive but also the master boot record. The master boot record once encrypted renders that hard drive useless. We have signatures for it and can protect against it (see SonicAlert message below). Here is also a great KB article on how to protect against Ransomwares. Best Practices to protect against CryptoWall and CryptoLocker (SW12434) ...
Spotflux "Waiting for Service" Fix LiquidLayer 1 9 monthsLiquidLayer (20): https://s3.amazonaws.com/groovehq/uploaded/gnohBSzdznMC2TJcvdMV?1432928150 The Spotflux Client shows "Waiting for Service" and never connects The "Waiting for Service" status indicates that the Spotflux Agent is unable to contact the Spotflux Connection Manager on your local machine. The Spotflux Connection Manager is responsible for establishing the connection to our servers. If you see this message, please check...
FortiVoice VoIP Phone Systems Admin Training LiquidLayer 1 9 monthsLiquidLayer (20): FortiVoice VoIP Phone Systems Admin Training See the following two links for all resources needed to setup and maintain a FortiVoice Phone System from Fortinet The Cookbook ! http://cookbook.fortinet.com/fortivoice-enterprise FortiVoice Systems / Documentation - Specification Guides http://www.fortivoice.com/support/documentation ---------------------------- Small Business Web Hosting Liquid Layer Networks ...
Power over Ethernet (POE) Explained Part 1&2 LiquidLayer 1 10 monthsLiquidLayer (20): Source: http://www.veracityglobal.com/resources/articles-and-white-papers/poe-explained-part-1.aspx Part 1 - An Introduction to POE What is Power over Ethernet? Power over Ethernet (POE) is a technology that lets network cables carry electrical power. For example, a digital security camera normally requires two connections to be made when it is installed: A network connection, in order to be able to communicate with video...
4 types of wired headset connectors LiquidLayer 3 10 monthsLiquidLayer (20): Plantronics S12 Telephone Headset System Quick Start User Guide https://www.plantronics.com/us/media/media-resources/literature/user_guides/s12_ug_eng.pdf
Master Browser in a Windows Workgroup LiquidLayer 1 10 monthsLiquidLayer (20): How to Determine the Master Browser in a Windows Workgroup Here’s a little problem that drove me crazy: How do you determine the Master Browser in a Windows Workgroup? First of all, lemme explain a bit about how a workgroup works. When you have a LAN set up running Windows machines, each machine can see all the others in Network Neighborhood (or just “Network” in Vista). If you want to see the files on another machine, you just go to...
Setup Ruckus Wireless Unleashed Config Help LiquidLayer 1 11 monthsLiquidLayer (20): *** STOP and Read (RTFM) When you buy a technology product "support" does not mean / call them right away and say / I have the product, now walk me thru what I do next. :(|) Support is "Break Fix" and do not get "offended" if you are instructed to review the documentation, as you should be doing anyway .... :cool: Review the setup documentation below / and if you have questions or something is not working...
Tawk.to Web Site Visitor Chat FREE LiquidLayer 1 11 monthsLiquidLayer (20): https://www.tawk.to https://www.tawk.to/wp-content/uploads/2014/03/tawkchat.png Message Your Visitors in Real Time tawk.to is a free messaging app that lets you monitor and chat with visitors on your website or from a free customizable page You never have to pay for live chat software again Tired of paying a monthly subscription 'per agent'? Well you can officially cancel your current subscription, as tawk.to is completely free...
Malware for sale! LiquidLayer 1 11 monthsLiquidLayer (20): Malware for sale! Malware exploit kits are easy to buy and simple to use. Attackers of any skill level can obtain them and generate new threats to attack you. Trustwave research found these attacks are increasingly common because they can yield more than a 1,400% ROI for cybercriminals. Spend a few minutes to learn about the drivers that put malware everywhere. View our infographic to see the trends in how much malware appears as a...
(We'll be ready soon) Windows 10 Blue Screen LiquidLayer 2 1 yearTerryoke (20): Thank you for posting this. I too went through the exact thought process and even thought of the word 'creepy'. Too funny! I followed Amber's advice and got back in after waiting 25 mins. What the heck is Microsoft up to now?
Xima ChroniCall Report Definitions ShoreTel LiquidLayer 1 1 yearLiquidLayer (20): Xima ChroniCall Report Definitions for ShoreTel Reporting Agent Report Fields Abandoned Calls - Shows the number of inbound calls associated with the given agent that did not end in a Talking or Voicemail event. These are calls that entered the system but were ended prematurely by the calling party. Agent Do Not Disturb Duration - Shows the total, maximum, minimum, or average block of time the specified agent spent in Do Not Disturb...
SonicWALL Virtual Access Point (VAP) Config LiquidLayer 1 1 yearLiquidLayer (20): http://thebeagle.itgroove.net/2012/07/24/sonicwall-virtual-access-point-vap-configuration/ This blog post is from July 2012, but still provides a good understanding including screen shots about the correct use case of Dell SonicWALL VAP services So, just what is a VAP anyway? In Sonicwall terms as VAP is a security profile and access point configuration that is overlaid on top of a physical Sonicpoint access point OR on top of the...
Dell SonicWALL Import Settings Matrix LiquidLayer 1 1 yearLiquidLayer (20): Can I Import the settings from one sonicwall UTM device to another? (Support Matrix) (SW6974) Title Can I Import the settings from one sonicwall UTM device to another? (Support Matrix) Resolution Article Applies To: Firmware/Software Version: All SonicOS Enhanced firmware Services: Support Matrix for Importing Preferences. Support Matrix for Importing Preferences from:- 1. Gen5 to Gen6 Products: Note: Upgrading from...
T-Mobile Data Breach: 10/01/2015 LiquidLayer 1 1 yearLiquidLayer (20): LifeLock notifies you of publicly reported large scale data breaches and stolen online credentials. While we have not detected a breach of your information, we found a data breach you may want to review. Data Breach Summary Organization T-Mobile Date(s) of breach Sept. 1, 2013 - Sept. 16, 2015 Date made public Oct. 1, 2015 # of records affected 15M Data compromised Name, Date of Birth, Social Security Number, Address, Identification...
Dell SonicWALL Knowledge Base LiquidLayer 1 1 yearLiquidLayer (20): Dell SonicWALL Knowledge Base The Knowledge Base allows you to search by queries containing unique keywords, symptoms or details, filter results, view, rate, email and print articles - select your product below to see more. Knowledge Base is your single source to search all product information Its the first place Dell Software Support engineers go when assisting our customers ...
VirusTotal | Analyzes Files and URLs LiquidLayer 2 1 yearLiquidLayer (20): Frequently Asked Questions https://www.virustotal.com/en/faq/ Answers to common VirusTotal related questions can be found under the topics listed below. Should you have a question that is not present in this FAQ please do not hesitate to contact us with your inquiry. Before asking please make sure it has not been answered in this FAQ or in any of the pertinent VirusTotal documentation sites. Navigate directly to questions...
FireEye Email Threat Prevention | cloud LiquidLayer 1 1 yearLiquidLayer (20): Published on Jan 25, 2014 Cloud-based platform that identifies, analyzes, and blocks email attacks / Including ZERO DAY Attacks as well helping with prevention of The CryptoLocker MalWare social engineering file locking | Ransom Attacks. Learn about FireEye Email Threat Prevention -- a cloud-based platform that protects against today's advanced email attacks. With no hardware or software to install, customers can quickly and easily...
Requirements for ShoreTel IP Phone 480 LiquidLayer 1 1 yearLiquidLayer (20): Min release for ShoreTel IP Phones 480 / 480g / 485g as well as other new features noted within the ShoreTEL 14.2 Release Notes / see link for PDF download 14.2 Release Notes Supports 400 Series IP Phones File-Based Music On Hold Softphone For Mac New Diagnostic Monitoring with Packet Capture (see video) IP 930D Wireless Handset Enhancements Download attachments: shoretel_14.2_release_notes.pdf ...
Cryptolocker: How to avoid ransom malware LiquidLayer 3 1 yearLiquidLayer (20): From Krebs on Security http://krebsonsecurity.com/2013/11/how-to-avoid-cryptolocker-ransomware/ Over the past several weeks, a handful of frantic Microsoft Windows users have written in to ask what they might do to recover from PC infections from “CryptoLocker,” the generic name for an increasingly prevalent and nasty strain of malicious software that encrypts your files until you pay a ransom. Unfortunately, the answer for these folks...
Heimdal Security - Prevent Cryptolocker LiquidLayer 1 1 yearLiquidLayer (20): Review: Heimdal Security Agent Posted by Willy Sudiarto Raharjo at Saturday, December 10, 2011 For those who have seen Thor, you might recognize Heimdal, which was described as the guardian for the Asgard. He watched for any attacks that might threaten Asgard and plays important role to prevent that. Heimdal Security Agent, a product developed by CSIS Security Group A/S named after a Norse god which has the same name (Heimdal in Thor was...
Difference Between PoE: 802.3at vs 802.3af LiquidLayer 1 1 yearLiquidLayer (20): IEEE 802.3at PoE+ standard provides up to 25.5W IEEE 802.3af PoE standard provides up to 12.95W Source: http://blog.antaira.com/poe-802-3at-vs-802-3af/ Power over Ethernet or PoE is a technology that provides both electrical power and data transmission to remote devices, such as IP phones or cameras, over standard Ethernet CAT5 cabling. PoE devices can be placed in remote locations eliminating the need for power outlets, allowing greater...
destitute