PC Security at Home

Hi guys.
Just wanted to know what sort of security tools/software you all employ on your Home devices?  I'm thinking of drive encryption and also doing regular Macrium images every week on my single home PC (it's my self-built gaming rig and my go-to machine - I do everything on it). Bitlocker seemed like the obvious choice as its native to 7, but just for my SSD which stores the OS/Applications and choice games and my storage drive with documents and records etc. I am however skeptical that Bitlocker encryption would render the drive as 'Unformatted' when i'd ever attempt to image it with Macrium a la TrueCrypt (RIP).
Thanks.

I have a long ramble:http://community.spiceworks.com/topic/1048057-outlook-calendar-disappeared-overnight-office-updates-maybe-coincidence
where I am trying to work out what happened and then saw this:http://answers.microsoft.com/en-us/office/forum/office_365hp-outlook/outlook-rss-feed-problem-after-last-office-365/073b5c31-3015-4386-a6d8-36e7747d92f0
which leads me to believe it isn't me going made, trigger finger...., but a borked Office update.

Similar Messages

  • Problem: securely erasing home folder after enabling file vault

    I enabled file vault. It took 4 days (125 GB) to "securely erase home folder", then when it finally reached 100% I got an error message that it could not be erased after all. I also now got an icon on the desktop (protected house) showing my home folder. Anybody experience with this? What do I do to securely erase? What can I do to speed it up? I have 4GB RAM and a HD of 500GB

    open /Applications/Utilities/Terminal.app
    At the prompt type:
    diskutil secureErase freespace 0 /
    (press return)
    This will secure erase free space on your boot volume.
    Level "0" (zero) is a Single-pass zero-fill erase. Levels 0 through 4 are supported.
    Here is a full description of the different erase levels: 0 - Single-pass zero-fill erase.
    A. 1 - Single-pass random-fill erase.
    B. 2 - US DoD 7-pass secure erase.
    C. 3 - Gutmann algorithm 35-pass secure erase.
    D. 4 - US DoE algorithm 3-pass secure erase.
    for more info (in Terminal) type:
    man diskutil
    (press return)
    This should take considerably less time than 4 days. On my Mac Pro with 162GB boot volume,
    130GB free (I keep my data on a different volume) it takes about 10 minutes using level "0".
    Disk Free Space Warnings are normal during operation and can be ignored.
    more info about it from apple support:
    http://support.apple.com/kb/TA24002
    You can invoke the erase procedure from Disk Utility GUI interface, but it usually is quicker
    when run from terminal.
    Kj ♘

  • Secure startup home web page not loading in FF 17.0.1

    Have https://www.google.com/ set as home page.
    What I get: Go to a website
    What I do: click Bookmarks>Google url link
    Result: https://www.google.com
    Go to a website does result in Google home page loading, but it appears to be loaded locally, not via an internet connection. Have Flagfox installed as an add-on, but this does not load until I do step 2, and only then is any activity seen in the lower left hand corner of the browser as the Google page loads.
    Odd thing is, without an active internet connection, FF reports page not found error and Google is not displayed.
    Note that step 3 is missing a backslash at the end of the url, even tho it is set and entered properly in Options for General>Startup. ???
    A https connection should also be green if valid, and I am not seeing that on most https sites. GRC.com does show this green color, but that is the only one that seems to work for me. Clicking the lock icon does give me vendor ownership information; the others state 'unknown'. Example: "You are connected to mozilla.org which is run by (unknown) Verified by GeoTrust, Inc. Your connection to this website is encrypted to prevent eavesdropping.

    You only see a green color in the Site Identity Button if websites use an Extended Validation (EV) SSL Certificate and not if a Domain Validation (DV) SSL Certificate is used like this SUMO forum site is using.
    *https://support.mozilla.org/kb/Site+Identity+Button
    *http://blog.mozilla.org/ux/2012/06/site-identity-ui-updates/
    Firefox may be loading pages from the Firefox browsing cache if they aren't loaded from the internet.<br />
    You may also have other software or a router that caches some pages.
    Which security software (firewall, anti-virus) do you have?
    Did you check that your security software isn't blocking the connection?
    Try to boot the computer in Windows Safe mode with network support (press F8 on the boot screen) as a test to see if that helps.

  • Unable to connect Photosmart C4795 to secure wireless home network

    I recently purchased a Photosmart C4795 for use on a secure home wireless network that only has two laptops on it.  I am using a Belkin G Wireless Router and Windows XP as an operating system.  The network uses WEP privacy, and I have I know I have to do something with the passphrase and the printer...but I just can't figure out where or how.  This is how my problem goes:
    I followed the setup wizard, and press the WPS button on the router when prompted.  The printer's blue light turns on, and I proceed to  choose the "Wireless network connection (802.11)" option to connect the device.  I then select "No (or not sure), my printer is connected to my network.  Help me to setup the wireless network connection for my printer"
    From there, I connect my laptop to the printer via USB as prompted, and the wizard begins installing several components (x/9) but always gets stuck on step 6 for a few minutes, and then says "Printer Setup has failed to complete."  After retrying this a couple times, my only choice is to check "Continue the installation without connecting to the printer now, I will connect later" and click Next.  The wizard ends, saying I'll have to add the device later, so when I go that option I once again choose "Wireless network connection"  From there, it gives me a blank printer list.  No printers, let alone the one I want, show up after Refreshing.  So when I click "my printer is not listed" I'm then back at square one where I am prompted to USB connect the printer and it just loops over the same errors. 
    Does anyone please have some advice or opinions?  I've tried calling customer support and I've browsed the forums, but I haven't found the solution and I'm just pretty confused.  Any help at all would be greatly appreciated.

    Let's add the printer manually. 
    Verify that you can browse to the printer's internal web page by its IP address into a browser.  (The IP address is on the Network Config Page that you can print from the printer's front panel).
    1. Click "Start" button --> Printers and Faxes.
    2. Under Printer Tasks, click "Add Printer".
    3. Click "Next" button on the Add Printer Wizard window.
    4. Select "Local printer attached to this computer". Deselect "Automatically detect and install My Plug and play printer". Click "Next".
    5. Under Select a Printer Port option, select "Create a new port" and select "Standard TCP/IP Port" and click "Next" button.
    6. In the "Welcome to the Add Standard TCP/IP printer port wizard" make sure that the printer is turned on and connected to same network that your computer is connected to. Click "Next" button.
    7. Under "Add Standard TCP/IP Printer Port" enter the printer's IP address. Click "Next" then click "Finish".
    8. Now, select HP from the list of manufacturers, select your printer from the list of Printer models and click 'Next' button.
    9. If you can't find your printer, you'll need to find the install CD and use the "Have Disk" option to select one of the hp*.ini files. Alternatively, you can select another HP printer model that is a similar type (series).
    10. Add the print spooler name and click "Next".
    11. Click "Next"
    12. Click "Next" and then "Finish"
    Say thanks by clicking "Kudos" "thumbs up" in the post that helped you.
    I am employed by HP

  • What is the best way to secure and harden a Macbook Pro against unwanted surveillance?

    What is the best way to secure and harden a Macbook Pro against unwanted surveillance? Tor, VPN, Little Snitch, etc. This would be for that latest version of Mavericks.

    djbabybokchoy wrote:
    Nothing specific, just speaking in general. Ex-wives, governments, bad guys...anyone really. I'm just looking to make my Mac a bit more private and secure, especially when on public networks.
    Governments and ex's will/may have recourse to the legal process (or in the case of the Gov they can choose to ignore the legal system if they feel like it) when they want to see something of yours, good luck hardening your Mac against that. The best way to avoid the possibility of snooping over public networks is to avoid them but if you can't then Kappy's suggestion will help.
    Strong passwords (everywhere) and don't use the same password in multiple locations.
    If you really want to secure your home wireless use Mac address connection authentication, do not allow unknown Mac addresses to connect. It's much stronger than a WPA password alone.

  • Ask the Expert:Cisco Web Security

    With Ryan Wager
    Welcome to the Cisco Support Community Ask the Expert conversation. This is an opportunity to learn about design, configuration and troubleshooting of the Cisco Web Security Solutions including Cisco Ironport WSA and Cisco ScanSafe with Cisco experts Kiran Sirupa and Ryan Wager. Kiran Sirupa is a technical marketing engineer in the product marketing team for the Cisco IronPort Web Security Appliance product line. He also works on documentation, partner ,and system engineering training. Kiran has been working in the Cisco Security Technologies group for more than six years. Ryan Wager is a technical marketing engineer at Cisco in the product management team for the ScanSafe Web Security platform. He is heavily involved with the product's integration with the Cisco Integrated Services Router Generation 2 platform, along with documentation, training, and testing of all new products and features. Before joining the product management team, Wagner spent two years as an implementation engineer helping ScanSafe's largest customers implement the platform into their networks.
    Remember to use the rating system to let Kiran and Ryan know if you have received an adequate response.  
    They might not be able to answer each question due to the volume expected during this event. Remember that you can continue the conversation on the Security sub-community, discussion forum shortly after the event. This event lasts through October 7, 2011.. Visit this forum often to view responses to your questions and the questions of other community members.

    Yes, the IronPort WSA will support all the security functions including Anti-Virus, Anti-Malware, Anti-Spyware, Web Reputation when working in conjunction with an existing proxy.
    There are two conditions:
    1. WSA acts as an upstream proxy - In this case, the authentication will be handled by your existing proxy, but the WSA is the first layer of defense. The WSA will perform a lookup in its web reputation database based on the destination. Also, The WSA can scan the http response with Anti-Virus, Anti-SpyWare and Anti-Malware software. However, since the WSA doesn't have user authentication information, you can only apply global controls for Acceptable Use.
    2. WSA has to go through an existing upstream proxy - In this case, the WSA has all the security functionality. In addition, it also handles the authentication. Hence, you can apply role based controls.
    You may refer to the following links for more information:
    WSA Product Literature: http://www.cisco.com/en/US/products/ps10164/prod_literature.html
    Cisco Security Reports: http://www.cisco.com/en/US/prod/vpndevc/annual_security_report.html
    Cisco Security Intelligence Operations: http://tools.cisco.com/security/center/home.x

  • Ask the Expert: Service Delivery Manager for Cloud Web Security with Alex Chan

    Welcome to the Cisco Support Community Ask the Expert conversation. This is an opportunity to learn and ask questions about the recommended practices for Cisco Cloud Web Security (CWS).  Cisco Cloud Web Security (CWS) provides industry-leading security and control for the distributed enterprise, with Cisco expert Alex Chan.
    October 27, 2014 through November 7, 2014.
    Learn how users are protected everywhere and anytime, when using CWS through Cisco worldwide threat intelligence, advanced threat defense capabilities, and roaming user protection. Create a virtual space to learn and ask questions about best practice when implementing Cloud Web Security offerings for various customer requirements and environments. Alex will also answer questions about Easy ID, CWS as SAML Service Provider, Deployment Options (such as ASA, ISR, WSA, Workgroup based Connector and AnyConnect Web Security agent.
    Remember to use the rating system to let Alex know if you have received an adequate response.
    Because of the volume expected during this event, Ali might not be able to answer each question. Remember that you can continue the conversation on the Security community, sub-community shortly after the event. This event lasts through November 7, 2014. Visit this forum often to view responses to your questions and the questions of other community members.

    Cisco CWS platform is one of the Cisco products that maintain collaboration with Cisco PSIRT, and there are few security vulnerabilities related to CWS were being monitored by PSIRT, which you can find out more about in: http://tools.cisco.com/security/center/home.x#~blog.
    Another Cisco entity known as "SenderBase" that is powered by Cisco Security Intelligence Operations (SIO) will provides a view into virus threat intelligence collected from CWS cloud traffics. For more information about "SenderBase", please visit this web site: http://www.senderbase.org

  • Shared Members in Dimensions - security question

    Within the dimension security, do shared members take the security based on their base member or on the parent member?
    For example, if we have a base member setup under "Homes" like this:
    Homes > examplehome
    and then a shared member for "examplehome" setup like this:
    Region1 > examplehome(shared)
    And the "Homes" and "Region1" folder have different security setup for iDescendants, will "examplehome(shared)" take the security from "Homes" or "Region1"?

    I've never investigated this but does it really matter? The data for examplehomes is only stored in one place. The share just gives you alternate aggregation paths. My guess is that once you set security for one all instances of the member share the security. After all, if you place examplehomes on a form with no parent, planning has no idea which parent to use.
    Dave

  • While i am starting a Managed server some security Exception is raised

    JAVA Memory arguments: -Xms256m -Xmx512m -XX:CompileThreshold=8000 -XX:PermSize=48m -XX:MaxPermSize=128m
    WLS Start Mode=Development
    CLASSPATH=:/home/durgasoft/HDFC_bea/patch_wls1030/profiles/default/sys_manifest_classpath/weblogic_patch.jar:/home/durgasoft/HDFC_bea/patch_cie660/profiles/default/sys_manifest_classpath/weblogic_patch.jar:/home/durgasoft/HDFC_bea/jdk160_05/lib/tools.jar:/home/durgasoft/HDFC_bea/wlserver_10.3/server/lib/weblogic_sp.jar:/home/durgasoft/HDFC_bea/wlserver_10.3/server/lib/weblogic.jar:/home/durgasoft/HDFC_bea/modules/features/weblogic.server.modules_10.3.0.0.jar:/home/durgasoft/HDFC_bea/wlserver_10.3/server/lib/webservices.jar:/home/durgasoft/HDFC_bea/modules/org.apache.ant_1.6.5/lib/ant-all.jar:/home/durgasoft/HDFC_bea/modules/net.sf.antcontrib_1.0.0.0_1-0b2/lib/ant-contrib.jar::/home/durgasoft/HDFC_bea/wlserver_10.3/common/eval/pointbase/lib/pbclient57.jar:/home/durgasoft/HDFC_bea/wlserver_10.3/server/lib/xqrl.jar::
    PATH=/home/durgasoft/HDFC_bea/wlserver_10.3/server/bin:/home/durgasoft/HDFC_bea/modules/org.apache.ant_1.6.5/bin:/home/durgasoft/HDFC_bea/jdk160_05/jre/bin:/home/durgasoft/HDFC_bea/jdk160_05/bin:/usr/lib/qt-3.3/bin:/usr/kerberos/sbin:/usr/kerberos/bin:/usr/local/bin:/bin:/usr/bin:/usr/local/sbin:/usr/sbin:/sbin:/home/durgasoft/bin
    * To start WebLogic Server, use a username and *
    * password assigned to an admin-level user. For *
    * server administration, use the WebLogic Server *
    * console at http://hostname:port/console *
    starting weblogic with Java version:
    java version "1.6.0_05"
    Java(TM) SE Runtime Environment (build 1.6.0_05-b13)
    Java HotSpot(TM) Client VM (build 10.0-b19, mixed mode)
    Starting WLS with line:
    /home/durgasoft/HDFC_bea/jdk160_05/bin/java -client -Xms256m -Xmx512m -XX:CompileThreshold=8000 -XX:PermSize=48m -XX:MaxPermSize=128m -Xverify:none -da -Dplatform.home=/home/durgasoft/HDFC_bea/wlserver_10.3 -Dwls.home=/home/durgasoft/HDFC_bea/wlserver_10.3/server -Dweblogic.home=/home/durgasoft/HDFC_bea/wlserver_10.3/server -Dweblogic.management.discover=false -Dweblogic.management.server=Admin_URL -Dwlw.iterativeDev=false -Dwlw.testConsole=false -Dwlw.logErrorsToConsole= -Dweblogic.ext.dirs=/home/durgasoft/HDFC_bea/patch_wls1030/profiles/default/sysext_manifest_classpath:/home/durgasoft/HDFC_bea/patch_cie660/profiles/default/sysext_manifest_classpath -Dweblogic.Name=hdfc_mng6_1 -Djava.security.policy=/home/durgasoft/HDFC_bea/wlserver_10.3/server/lib/weblogic.policy weblogic.Server
    <Jun 24, 2012 5:31:42 AM GMT+05:30> <Info> <WebLogicServer> <BEA-000377> <Starting WebLogic Server with Java HotSpot(TM) Client VM Version 10.0-b19 from Sun Microsystems Inc.>
    <Jun 24, 2012 5:32:11 AM GMT+05:30> <Info> <Management> <BEA-141107> <Version: WebLogic Server 10.3 Fri Jul 25 16:30:05 EDT 2008 1137967 >
    <Jun 24, 2012 5:32:11 AM GMT+05:30> <Emergency> <Management> <BEA-141151> <The admin server could not be reached at http://Admin_URL.>
    <Jun 24, 2012 5:32:11 AM GMT+05:30> <Info> <Configuration Management> <BEA-150018> <This server is being started in managed server independence mode in the absence of the admin server.>
    <Jun 24, 2012 5:32:11 AM GMT+05:30> <Notice> <WebLogicServer> <BEA-000365> <Server state changed to STARTING>
    <Jun 24, 2012 5:32:11 AM GMT+05:30> <Info> <WorkManager> <BEA-002900> <Initializing self-tuning thread pool>
    <Jun 24, 2012 5:32:11 AM GMT+05:30> <Notice> <Log Management> <BEA-170019> <The server log file /home/durgasoft/HDFC_bea/domains/HDFC_DOV_Domain/servers/hdfc_mng6_1/logs/hdfc_mng6_1.log is opened. All server side log events will be written to this file.>
    <Jun 24, 2012 5:32:12 AM GMT+05:30> <Error> <Security> <BEA-090870> <The realm "myrealm" failed to be loaded: weblogic.security.service.SecurityServiceException: com.bea.common.engine.ServiceInitializationException: com.bea.common.store.service.StoreInitializationException: [Security:099060]The URL specified for the data store connection is invalid: ldap://null:-1,please check all host configuration parameters..
    weblogic.security.service.SecurityServiceException: com.bea.common.engine.ServiceInitializationException: com.bea.common.store.service.StoreInitializationException: [Security:099060]The URL specified for the data store connection is invalid: ldap://null:-1,please check all host configuration parameters.
    at weblogic.security.service.CSSWLSDelegateImpl.initializeServiceEngine(Unknown Source)
    at weblogic.security.service.CSSWLSDelegateImpl.initialize(Unknown Source)
    at weblogic.security.service.CommonSecurityServiceManagerDelegateImpl.InitializeServiceEngine(Unknown Source)
    at weblogic.security.service.CommonSecurityServiceManagerDelegateImpl.initializeRealm(Unknown Source)
    at weblogic.security.service.CommonSecurityServiceManagerDelegateImpl.loadRealm(Unknown Source)
    Truncated. see log file for complete stacktrace
    com.bea.common.engine.ServiceInitializationException: com.bea.common.store.service.StoreInitializationException: [Security:099060]The URL specified for the data store connection is invalid: ldap://null:-1,please check all host configuration parameters.
    at com.bea.common.engine.internal.ServiceEngineImpl.findOrStartService(ServiceEngineImpl.java:365)
    at com.bea.common.engine.internal.ServiceEngineImpl.findOrStartService(ServiceEngineImpl.java:315)
    at com.bea.common.engine.internal.ServiceEngineImpl.lookupService(ServiceEngineImpl.java:257)
    at com.bea.common.engine.internal.ServicesImpl.getService(ServicesImpl.java:72)
    at weblogic.security.service.internal.WLSIdentityServiceImpl.initialize(Unknown Source)
    Truncated. see log file for complete stacktrace
    com.bea.common.store.service.StoreInitializationException: [Security:099060]The URL specified for the data store connection is invalid: ldap://null:-1,please check all host configuration parameters.
    at com.bea.common.ldap.properties.LDAPStoreServicePropertiesConfigurator.convertStoreProperties(LDAPStoreServicePropertiesConfigurator.java:53)
    at com.bea.common.security.internal.service.StoreServiceImpl.initJDOProperties(StoreServiceImpl.java:101)
    at com.bea.common.security.internal.service.StoreServiceImpl.init(StoreServiceImpl.java:73)
    at com.bea.common.engine.internal.ServiceEngineImpl.findOrStartService(ServiceEngineImpl.java:363)
    at com.bea.common.engine.internal.ServiceEngineImpl.findOrStartService(ServiceEngineImpl.java:315)
    Truncated. see log file for complete stacktrace
    >
    <Jun 24, 2012 5:32:12 AM GMT+05:30> <Notice> <Security> <BEA-090082> <Security initializing using security realm myrealm.>
    <Jun 24, 2012 5:32:12 AM GMT+05:30> <Critical> <WebLogicServer> <BEA-000362> <Server failed. Reason:
    There are 1 nested errors:
    weblogic.security.service.SecurityServiceRuntimeException: [Security:090399]Security Services Unavailable
    at weblogic.security.service.CommonSecurityServiceManagerDelegateImpl.doBootAuthorization(Unknown Source)
    at weblogic.security.service.CommonSecurityServiceManagerDelegateImpl.initialize(Unknown Source)
    at weblogic.security.service.SecurityServiceManager.initialize(Unknown Source)
    at weblogic.security.SecurityService.start(SecurityService.java:141)
    at weblogic.t3.srvr.SubsystemRequest.run(SubsystemRequest.java:64)
    at weblogic.work.ExecuteThread.execute(ExecuteThread.java:201)
    at weblogic.work.ExecuteThread.run(ExecuteThread.java:173)
    >
    <Jun 24, 2012 5:32:12 AM GMT+05:30> <Notice> <WebLogicServer> <BEA-000365> <Server state changed to FAILED>
    <Jun 24, 2012 5:32:12 AM GMT+05:30> <Error> <WebLogicServer> <BEA-000383> <A critical service failed. The server will shut itself down>
    <Jun 24, 2012 5:32:12 AM GMT+05:30> <Notice> <WebLogicServer> <BEA-000365> <Server state changed to FORCE_SHUTTING_DOWN>

    Hi,
    Please remember to mark the answers accordingly... Helpful or correct... You will be helping the forum community by doing that.
    First thing to fix is the Admin_URL, there should be something like:
    -Dweblogic.management.server=http://localhost:7001How are you starting this managed server? Node manager or command line? Try both options and see if they bring up the same error.
    Cheers,
    Vlad

  • Wireless security: tech guys or Apple Employees

    I am working on my wireless security at home. What security protocols are comparable with the itouch? I know Wep is, but does TKIP or AES work with WPA(2)? What about shared key?
    Thanks for whatever help you can give

    Whenever I set my routter to shared key, my iPod can no longer find my network. Is there a reason for this?

  • Securing wifi suggestions

    Been doing some reading about wifi security and wanted to calibrate here with some knowledgeable users.  What are best practices for securing a home wifi network?
    From what I have read, best practices:
    *WPA2/personal with AES encryption.
    *Use a strong (mixed alpha/num/sym) 63 character password. 
    *Use a strong (mixed alpha/num/sym) 63 character SSID.  Why?  My understanding is that the SSID is used as a component to generate key hashes used for handshakes.  Therefore, using a common SSID could mean that there is a set of rainbow tables build off that specific SIDD.
    False sense of securities include:
    *MAC filtering.
    *SSID hiding which is actually a security risk since every device connected to the network will basically scream out 'here I am... where is SSID xxx' when not connected.
    *WEP-based encryption.
    Last edited by graysky (2012-03-02 14:52:54)

    cfr wrote:63 character random keys and ssids are all very well but I would find them excruciating, error prone and probably end up abandoning any sort of security.
    Call me paranoid, but when I need to create a password for something valuable (like a router), I use a utility created many moons ago by a Gentoo developer:
    http://swift.siphos.be/tools-hex2passwd.html
    This allows me to only need to remember a super simple word/phrase, but create (and most importantly, recreate) a fairly strong password... while still causing someone on a semi-compromised system some difficulty to recreate even if they found the hex2passwd utility on the box.
    I also added the following to my BASH profile:
    export HISTCONTROL=ignoreboth
    so that when I need to create/recreate a password using the utility, I simply add a space at the beginning of the command line so it won't end up in my BASH history.
    It's not a perfect method... but what is?
    OBTW: The hex2passwd utility is in the AUR.
    tl;dr story...
    I set up my neighbor's box so that he could log into my wireless router (he's unemployed) that uses one of these insanely long passwords. Sometime later he tells me a story about how he let a friend try to (manually) copy the password so that she could log her laptop into my router to surf the web during her visit.
    While I was somewhat upset that he let her do that, he said he was sure that she never would be able to copy it correctly because it was so damn long and bizarre... and with a big grin, he said he was right.

  • Report folder security

    Hi,
    I have setup a user A (it belong to Administrators group) and it can access the Reporting Server's report folders, however, another user B (it belong to USERS only) cannot access.
    I already tick all the 5 roles (Browser, Content Management, My Reports, Publisher, Report Builder) to be assigned to B (from the Folder Role Assignment)
    Please help ~~

    Hi ,for this you need to define security at two level .
    First at site settings
    second for folder.
    To create a system-level role assignment
    If necessary, log on as a local administrator.
    Open a browser window and type the Report Manager URL to start the application. For example http://<server name>/reportserver
    Click Site Settings at the top of the page.
    Click the Security tab at the side of the page. This page shows all system-level role assignments that are currently defined. On a new report server installation, only the two predefined roles, System Administrator and System User, are visible.
    There is one built-in role assignment that is created automatically; it maps the built-in local administrators group to the System Administrator role
    Click New Role Assignment.
    In Group or user name, specify a domain group account that includes all of the users who require permissions to view report server content and subscribe to reports. Specify the account in this format:
    domain\group. The account should be in the same domain or in a trusted domain. If you do not have a domain group that fits this description, you can specify individual domain user accounts instead.
    Select System User.
    Click OK.
    To create an Folder level security
    Click Home at the top of the page to open the Report Manager home page.
    Click the Folder Settings button.
    Click New Role Assignment.
    In Group or user name, specify the name of a domain group account that includes all of the users who require permissions to view reports. Specify the account
    in this format: domain\group. The account should be in the same domain or in a trusted domain. If you do not have a domain group that fits this description, you can specify individual domain user accounts instead.
    Select Browser.
    Click OK.
    Click New Role Assignment again.
    Type the name of a domain user account for a user who has administrative responsibilities for this report server. Specify the account in this format:
    domain\user. The account should be in the same domain or in a trusted domain.
    Select Content Manager.
    Click OK to save the role assignments.
    Thanks
    Please Mark This As Answer or vote for Helpful Post if this helps you to solve your question/problem. http://techequation.com

  • Trying to access a military site that is an education site not secured

    this is not a site secured from home access, it is a military education site and firefox will not allow me to access it.

    What i did really works for me:
    # go to address bar and type about:config then a popup will ask you for security and click "'''I will be careful i promise! '''"
    # search for "'''security.ssl.allow_unrestricted_renego_everywhere__temporarily_available_pref'''" on the top of the filter text box
    # Double click on the value that will set the value to "'''false'''"
    Then go to the page you are having problem. BINGO!!! That works :) Enjoy!!

  • Chmod -R 700 on home directory doesn't restrict other users

    Hi All,
    I have several users sharing a mac. I wanted to secure my home directory so I opened a terminal and typed:
    cd /users
    chmod -R 700 alandye
    a ls -l confirmed permissions recursively changed for my home directory and subsidiary directories and files had been set to og-rwx.
    Then, I logged in as a different user (tknoble) , and tried to access the directory (alandye)through the finder that I had just restricted permissions on, and viola, I could read any file in there.
    This doesn't happen on Unix or Linux, why is it happening here? I tried restricting account tknoble to non-administrative, but got the same problem.
    Net/net, finder seems to be ignoring the posix file permissions.
    Can anyone explain why this is happening?
    thanks,
    Alan

    ... Still, the ACL issue and the open default permissions including the default umask on the Mac has me perplexed. I've used ACL's for years as a system manager on mainframes and other secure enterprise unix platforms, generally through a central administrative console like RACF or ACF2 on the mainframe. It identifies all ACL's on the system and allows you to administer them centrally. The idea that my mac has system generated ACL's that are only accessible through chmod on a file by file basis and are inherently set with open permissions seems like a bad security setup.
    First, the default permissions and umask values have been typical of Unix systems since I started using them back in '85. And even in the Family situation, allowing family members the ability to share information is not uncommon, and can be frustrating to the family if everything is totally locked up.
    Plus your complaints about ACLs, it just a side issue, as the /User/username folder should have only had an ACL that prevented accidental deletion. Your real problem was cached Finder information. So this ACL discussion is just a tangential issue.
    Second, a Mac is a mass market consumer personal computer, with a strong leaning towards 1 person being the owner and user of that computer. It is not typically sold as a Mainframe replacement. Having tightly locked down, no access default permissions and umask just makes life extremely difficult for the mass market consumer.
    Applying Mainframe rules to a Mac is only going to frustrate you.
    As for having an ACL admin tool besides chmod, for the most part consumers are not aware of ACLs, they are used sparingly on the Mac, and as such it is not something Apple has felt a need to invest in. Maybe there is a 3rd party utility that will provide this service for you.
    While investigating this I did discover a similar problem with a RAID array I have attached with similar file permission problems. chmod -R 700 on directories does set the permission bits correctly, but again, finder bypasses them and allows access for other users, even after a reboot. Apparently, according to this http://hints.macworld.com/article.php?story=20020418091450891 the externally attached drives ignore ownership by default.
    Again, the Mac is a mass market consumer item. Just about every external drive on a Mac is a detachable device, which can be moved around to other Macs, etc... (especially USB thumb drives, SD cards, etc...). Having these devices default to strict security would again frustrate the mass consumer Mac user, when all they want to do is get their pictures off of the SD card, or move files between 2 computers, etc...
    My point is that the defaults Apple has selected are targeted to the mass consumer Mac user. Not the data center mainframe user.
    I would encourage you to give Apple feedback on your experiences
    <http://www.apple.com/feedback/macosx.html>
    or
    BugReporter
    <http://bugreporter.apple.com>
    Free ADC (Apple Developer Connection) account needed for BugReporter.
    Anyone can get a free account at:
    <http://developer.apple.com/programs/register/>

  • Microsoft security Advisory 2028859

    A serious security flaw has been found in Windows 7 systems running Aero.Untill microsoft releases a security patch users can disable the Aero theme to  prevent the issue from being exploited.
    To disable Windows Aero by changing the theme, perform the following steps for each user on a system:
    Click Start, select the Control Panel, and then click on Appearance and Personalization.
    Under the Personalization category, click on Change the Theme.
    Scroll to the bottom of the listed themes and select one of the available Basic and High Contrast Themes.
    For further information go through the below given link 
    http://www.microsoft.com/technet/security/advisory/2028859.mspx
    The above mentioned vulnerability only affects Windows 7 and Windows server 2008 R2 users.
    Cheers and regards,
    • » νιנαソѕαяα∂нι ѕαмανє∂αм ™ « •
    ●๋•کáŕádhí'ک díáŕý ツ
    I am a volunteer here. I don't work for Lenovo

    Here is more information on Microsoft security advisory 2269637, mitigating it from Cisco devices:
    Vulnerability alert: http://tools.cisco.com/security/center/viewAlert.x?alertId=21268
    Mitigation buletin: http://tools.cisco.com/security/center/viewAlert.x?alertId=22317
    All security related advisories for cisco can be found from the Cisco SIO (Security Intelligence Operations):
    http://tools.cisco.com/security/center/home.x
    Hope that helps.

Maybe you are looking for

  • Calendar does not sync consistently

    Ever since I added the iPad2 I have noticed that my calendars do not sync consistently. One week they match and the next week they do not. I will add events on my iPhone and they show up on my MBP and iPad2 as they are supposed to and the next time I

  • 10.8.1 causing external projector to go to sleep

    I rencently updated to Mac OS X 10.8.1 on my mid-2010 15" MacBook Pro and I'm experiencing an issue with external projectors going to sleep after just a few minutes of use. I've been able to reproduce the issue with multiple projectors, multiple VGA

  • Asset Report with CJ88 document

    Hi Experts We have developed Z report for asset having material code,vendor,CJ88 document.In old Z report we are not getting material & vendor which is relevant for CJ88 document. So we have develop new Z report in which we are getting material but t

  • NAT 8.6 multiple subnets in a single static NAT

    Hello all, I have this question, probably pretty an easy to answer, but unfortunately I can't test it myself in a production environment right now. Do you know if is possible to have in ASA 8.6 a Static NAT rule with multiple subnets in both object g

  • Tracing SOAP-ENV:Server.Exception errors

    Hi, I have generated my WebServices from an ADF Application Module using Jdeveloper 10.1.2.1. After deploying the Web Services to the Application Server I call the web service test screens i.e. http://machine:port/MyWebServicesPath/MyWebService to ch