Configure Windows Firewall to Allow Pings Open Windows Firewall. Right click Inbound Rules and New Rule. Select Predefined and select File and Printer Sharing (Echo Request – ICMPv4-In). Next and Finish. Your system can respond ping requests.
Tag: System Security
SAP Security Audit Log Activation
As of Release 4.0, you can use the Security Audit Log to record security-related system information such as changes to user master records or unsuccessful logon attempts. This log is a tool designed for auditors who need to take a detailed look at what occurs in the SAP System. By activating the audit log, you…
Disable root SSH Login on Linux Server
Root user is the most authoritative user on linux operating systems. You can take measure for security with disable root ssh. You can connect to server with other users. Edit sshd_config vi /etc/ssh/sshd_config #LoginGraceTime 2m #PermitRootLogin yes #StrictModes yes Note : “PermitRootLogin yes” is default value. This value allows ssh root login You have to…
Social Engineering Attacks
All social engineering techniques are based on specific attributes of human decision-making known as cognitive biases. These biases, sometimes called “bugs in the human hardware,” are exploited in various combinations to create attack techniques, some of which are listed here: Pretexting Pretexting is the act of creating and using an invented scenario (the pretext) to…