The biggest threat remaining is the hacker has several sets of credentials you used at the banks. If you use those username and password combinations anywhere else, you need to change them all. It’s...
Type: Posts; User: bashiergui; Keyword(s):
The biggest threat remaining is the hacker has several sets of credentials you used at the banks. If you use those username and password combinations anywhere else, you need to change them all. It’s...
How did the hacker get your username and password? Also ask the banks what remote access software the hacker used. Knowing the answers can help you determine if you are at risk.
Reviewing your firewall logs would show whether the firewall is preventing connection.
Are you connecting to the server from another machine on the network? Over the internet? From the same server?
Describe what “net monitor for employees” does please. What exactly are you trying to monitor? There are many options for monitoring systems and networks in Linux. If we understand your goal you will...
Wiping the infected computer is good advice. Wiping every other server on the LAN is overkill.
I would correlate the login logs with firewall logs. When you see a login, look at the firewall logs at that same timestamp to see what the source IP is.
That is drastic advice for a crypto miner. I would be more concerned about crappy passwords in use on other systems, especially if the same sys admin works on them all. Make sure all systems in the...
IMO you should file a report with law enforcement as the sort of stalking you’re describing is serious and alarming.
The short answer is yes, it is possible. The liklihood depends on how...
The netmask 255.255.255.255 tells the computer that no other computers are in your network. Which means you can’t talk to any other computers. The broadcast address is usually 255.255.255.255.
Why...
Why do you need to scan for malware?
What is the specific threat that worries you?
If you're encrypting the archive and using asymetric keys to encrypt/decrypt, then the only way to get the password is to have the private key.
Looks like it could be Crypt0locker/torrentlocker (which disappeared last year but then came back)....
It would be nice if we could only develop for the latest and greatest. But the sad reality is that businesses need to create software that works for their customers, which means it's developed for...
Your best defense no matter what OS you run is
1. Update your software automatically.
2. Turn off services you don't need.
3. Routinely back up your data to something that's not permanently...
To increase subscribers. I'm sure you could find a shady app that needs full permissions to your account and promises to boost your subscribers for you which they do by promoting the account this...
Have you reviewed this http://koditips.com/kodi-keeps-shutting-down-freezing-crashing/
How are you trying to run it?
./yourgame.jar
Best way to find out is to capture packets. You can use wireshark or tcpdump. Without reviewing you're left guessing.
That said, I've seen lots of Twitter connections like that when I browse to a...
Excellent advice from TheFu. I would add risk acceptances. When you escalate a security recommendation, include a risk acctance for management to sign if they choose not to implement your...
Like others said it looks like a bunch of random stuff. Don't put too much faith in the names that AV vendors give malware. They won't tell you much. It's impossible to tell what malware you have...
Change the default login password on your router, too. Bots scan the internet incessantly looking for routers they can log into using default credentials and join to a botnet.
The leaked information did not include details that would allow anti-virus vendors to get signatures. It did reference some malware /tools that have been available elsewhere so those have probably...
If you've got the links to the Virus Total samples I can try to figure out what he was infected with. AVs give random names to malware that rarely mean much other than "it's bad!!!" If we can...
Professionals will wipe the drive by overwriting the entire disk with 0s or random 1s and 0s (which is what DBAN will do). Then they install the new operating system. It is an unnecessary step to...