<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Security &#8211; Softvative.com</title>
	<atom:link href="https://softvative.com/category/security/feed/" rel="self" type="application/rss+xml" />
	<link>https://softvative.com</link>
	<description>Innovative Technology Solutions and Services</description>
	<lastBuildDate>Wed, 10 Dec 2014 06:07:00 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://softvative.com/wp-content/uploads/2020/02/cropped-logo-1-1-32x32.png</url>
	<title>Security &#8211; Softvative.com</title>
	<link>https://softvative.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>MS14 081 Vulnerability in SharePoint</title>
		<link>https://softvative.com/ms14-081-vulnerability-in-sharepoint/</link>
					<comments>https://softvative.com/ms14-081-vulnerability-in-sharepoint/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Wed, 10 Dec 2014 06:07:00 +0000</pubDate>
				<category><![CDATA[2010]]></category>
		<category><![CDATA[2013]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[SharePoint]]></category>
		<guid isPermaLink="false">http://softvative.com/2014/12/ms14-081-vulnerability-in-sharepoint/</guid>

					<description><![CDATA[MS14 081 Vulnerability in SharePoint Version 1.0 Seems like this year has been really hard on Office Web Apps and Word Services within SharePoint 2010 / 2013 for security reasons. Microsoft released another security bulletin that impacts: SharePoint 2010 SharePoint 2013 Office Web Apps 2013 Microsoft Project Server 2010 / 2013&#160; and other application that [&#8230;]]]></description>
		
					<wfw:commentRss>https://softvative.com/ms14-081-vulnerability-in-sharepoint/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2416</post-id>	</item>
		<item>
		<title>MS14 073 Vulnerability in SharePoint</title>
		<link>https://softvative.com/ms14-073-vulnerability-in-sharepoint/</link>
					<comments>https://softvative.com/ms14-073-vulnerability-in-sharepoint/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Wed, 12 Nov 2014 04:52:00 +0000</pubDate>
				<category><![CDATA[2010]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[SharePoint]]></category>
		<guid isPermaLink="false">http://softvative.com/2014/11/ms14-073-vulnerability-in-sharepoint/</guid>

					<description><![CDATA[Today Microsoft released a patch for vulnerability in Microsoft SharePoint Foundation Could Allow Elevation of Privilege under Microsoft Security Bulletin MS14-073. What:An attacker who successfully exploited the vulnerability could execute arbitrary script in the security context of the logged-on user. The script could then, for example, take actions on the affected SharePoint site on behalf [&#8230;]]]></description>
		
					<wfw:commentRss>https://softvative.com/ms14-073-vulnerability-in-sharepoint/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2390</post-id>	</item>
		<item>
		<title>Recover Symantec Protection Engine Lost Password</title>
		<link>https://softvative.com/recover-symantec-protection-engine-lost-password/</link>
					<comments>https://softvative.com/recover-symantec-protection-engine-lost-password/#comments</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Wed, 15 Oct 2014 22:30:00 +0000</pubDate>
				<category><![CDATA[2010]]></category>
		<category><![CDATA[2013]]></category>
		<category><![CDATA[Recovery]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[SharePoint]]></category>
		<category><![CDATA[Symantec]]></category>
		<guid isPermaLink="false">http://softvative.com/2014/10/recover-symantec-protection-engine-lost-password/</guid>

					<description><![CDATA[Recover Symantec Protection Engine Lost Password Version: 1.2 Symantec Protection for SharePoint Servers (SPSS) is an antivirus solution for SharePoint. SPSS uses Symantec Protection Engine (SPE) as the underlining solution to provide the security framework to SPSS. On each SharePoint Server running SPSS, usually you also have Symantec Protection Engine (SPE) there as well running [&#8230;]]]></description>
		
					<wfw:commentRss>https://softvative.com/recover-symantec-protection-engine-lost-password/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2394</post-id>	</item>
		<item>
		<title>Symantec Antivirus for SharePoint Blocked Linked Excel Files</title>
		<link>https://softvative.com/symantec-antivirus-for-sharepoint-blocked-linked-excel-files/</link>
					<comments>https://softvative.com/symantec-antivirus-for-sharepoint-blocked-linked-excel-files/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Wed, 08 Oct 2014 23:00:00 +0000</pubDate>
				<category><![CDATA[2010]]></category>
		<category><![CDATA[2013]]></category>
		<category><![CDATA[Antivirus]]></category>
		<category><![CDATA[Excel]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[SharePoint]]></category>
		<category><![CDATA[Symantec]]></category>
		<guid isPermaLink="false">http://softvative.com/2014/10/symantec-antivirus-for-sharepoint-blocked-linked-excel-files/</guid>

					<description><![CDATA[Symantec Protection for SharePoint Blocked Linked Excel Files Issue Summary Symantec Protection for SharePoint Servers (SPSS) 6.0 was deployed in the SharePoint farm. After deployment, certain files are getting blocked by it even though Symantec Antivirus on desktop had cleared those as clean files. In one of my previous post Linked Excel Files and SharePoint, [&#8230;]]]></description>
		
					<wfw:commentRss>https://softvative.com/symantec-antivirus-for-sharepoint-blocked-linked-excel-files/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2395</post-id>	</item>
		<item>
		<title>Using Cisco Wifi Controller for Employee and Guest Wifi</title>
		<link>https://softvative.com/using-cisco-wifi-controller-for-employee-and-guest-wifi/</link>
					<comments>https://softvative.com/using-cisco-wifi-controller-for-employee-and-guest-wifi/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Wed, 01 Oct 2014 12:00:00 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">http://softvative.com/2014/10/using-cisco-wifi-controller-for-employee-and-guest-wifi/</guid>

					<description><![CDATA[Using Cisco Wifi Controller for Employee and Guest Wifi V: 1.0 Case Study: The client was using two different ISPs one each for employee and guest wifi.&#160; Employees were sharing the guest wifi to bypass the firewall, web filters and security policies on the main network. Client was paying enormous amount of $$$$ to ISP. [&#8230;]]]></description>
		
					<wfw:commentRss>https://softvative.com/using-cisco-wifi-controller-for-employee-and-guest-wifi/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2396</post-id>	</item>
		<item>
		<title>MS14-050 Critical Vulnerability in SharePoint 2013</title>
		<link>https://softvative.com/ms14-050-critical-vulnerability-in-sharepoint-2013/</link>
					<comments>https://softvative.com/ms14-050-critical-vulnerability-in-sharepoint-2013/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Wed, 13 Aug 2014 01:58:00 +0000</pubDate>
				<category><![CDATA[2013]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[SharePoint]]></category>
		<guid isPermaLink="false">http://softvative.com/2014/08/ms14-050-critical-vulnerability-in-sharepoint-2013/</guid>

					<description><![CDATA[MS14-050 Critical Vulnerability in SharePoint 2013 V: 1.2 Recently Microsoft Security Bulletin MS14-050 has been released as Critical. It applies to following products: Sharepoint Server 2013 (with or without SP1) Sharepoint Foundation 2013&#160;(with or without SP1) Maximum Security Impact:&#160;Elevation of Privilege Aggregate Severity Rating: Important This security update may require reboot.&#160; This security update resolves [&#8230;]]]></description>
		
					<wfw:commentRss>https://softvative.com/ms14-050-critical-vulnerability-in-sharepoint-2013/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2402</post-id>	</item>
		<item>
		<title>MS14-022 Critical Vulnerabilities in SharePoint ProjectServer</title>
		<link>https://softvative.com/ms14-022-critical-vulnerabilities-in-sharepoint-projectserver/</link>
					<comments>https://softvative.com/ms14-022-critical-vulnerabilities-in-sharepoint-projectserver/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Wed, 14 May 2014 04:28:00 +0000</pubDate>
				<category><![CDATA[2010]]></category>
		<category><![CDATA[2013]]></category>
		<category><![CDATA[ProjectServer]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[SharePoint]]></category>
		<guid isPermaLink="false">http://softvative.com/2014/05/ms14-022-critical-vulnerabilities-in-sharepoint-projectserver/</guid>

					<description><![CDATA[Recently Microsoft Security Bulletin MS14-022 &#160;has been released as Critical. It covers following products: Sharepoint Server 2007, 2010, 2013 WSS 3.0 Sharepoint Foundation 2010 / 2013 Office Web Apps Server 2010 / 2013 Sharepoint Designer 2010 / 2013 Risk: High Discovered: 05/13/2014 The security update addresses the vulnerabilities by correcting how SharePoint Server and Web [&#8230;]]]></description>
		
					<wfw:commentRss>https://softvative.com/ms14-022-critical-vulnerabilities-in-sharepoint-projectserver/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2373</post-id>	</item>
		<item>
		<title>Word Automation Services Vulnerability and Sharepoint Server</title>
		<link>https://softvative.com/word-automation-services-vulnerability-and-sharepoint-server/</link>
					<comments>https://softvative.com/word-automation-services-vulnerability-and-sharepoint-server/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Wed, 26 Mar 2014 02:53:00 +0000</pubDate>
				<category><![CDATA[2010]]></category>
		<category><![CDATA[2013]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[SharePoint]]></category>
		<guid isPermaLink="false">http://softvative.com/2014/03/word-automation-services-vulnerability-and-sharepoint-server/</guid>

					<description><![CDATA[There is a vulnerability in Microsoft Word that could allow remote execution. That security issue impacts: 1.&#160;&#160;&#160;&#160;&#160;&#160; Microsoft Word 2003 to 2013 2.&#160;&#160;&#160;&#160;&#160;&#160; MS Word Viewer 3.&#160;&#160;&#160;&#160;&#160;&#160; Word Automation Services&#160; in Sharepoint 2010 and 2013 4.&#160;&#160;&#160;&#160;&#160;&#160; MS Office Web Server 2010 and 2013 The issue is mainly with the special RTF formatted data. Risk Mitigation: [&#8230;]]]></description>
		
					<wfw:commentRss>https://softvative.com/word-automation-services-vulnerability-and-sharepoint-server/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2383</post-id>	</item>
		<item>
		<title>Secure Data Wiping and Recovery Tools</title>
		<link>https://softvative.com/secure-data-wiping-and-recovery-tools/</link>
					<comments>https://softvative.com/secure-data-wiping-and-recovery-tools/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Sat, 03 Mar 2012 19:35:00 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">http://softvative.com/2012/03/secure-data-wiping-and-recovery-tools/</guid>

					<description><![CDATA[In the past I worked on few file / data recovery and secure hard drive wiping projects. Before throwing away your old servers, laptop and other storage media, make sure to securely wipe it, try the recovery tools to retrieve data and work from there. Using encryption on your storage media is recommended. Instead, I’ll [&#8230;]]]></description>
		
					<wfw:commentRss>https://softvative.com/secure-data-wiping-and-recovery-tools/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">314</post-id>	</item>
		<item>
		<title>LUA Least Privilege to User Accounts</title>
		<link>https://softvative.com/lua-least-privilege-to-user-accounts/</link>
					<comments>https://softvative.com/lua-least-privilege-to-user-accounts/#comments</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Tue, 02 Jan 2007 00:03:00 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">http://softvative.com/2007/01/lua-least-privilege-to-user-accounts/</guid>

					<description><![CDATA[Few years back, I was working in development center. Every developer wanted to have full system rights to install everything they want. End result was lots of system failures, viruses, Trojans &#38; what not on the network. Giving users limited access to system by making sure all application functionality work was a difficult task. At [&#8230;]]]></description>
		
					<wfw:commentRss>https://softvative.com/lua-least-privilege-to-user-accounts/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">431</post-id>	</item>
	</channel>
</rss>
