<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: 10 of the Most Dangerous Things to Have on Your Network</title>
	<atom:link href="http://www.gfi.com/blog/10-of-the-most-dangerous-things-to-have-on-your-network/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.gfi.com/blog/10-of-the-most-dangerous-things-to-have-on-your-network/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=10-of-the-most-dangerous-things-to-have-on-your-network</link>
	<description>Brought to you by GFI Software</description>
	<lastBuildDate>Tue, 06 Aug 2013 14:24:30 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
	<item>
		<title>By: John Galloway</title>
		<link>http://www.gfi.com/blog/10-of-the-most-dangerous-things-to-have-on-your-network/comment-page-1/#comment-39817</link>
		<dc:creator>John Galloway</dc:creator>
		<pubDate>Wed, 24 Oct 2012 12:28:25 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=8872#comment-39817</guid>
		<description><![CDATA[you missed the most danegerous - 
USERS
but then, without users we wouldn&#039;t have jobs would we?]]></description>
		<content:encoded><![CDATA[<p>you missed the most danegerous &#8211;<br />
USERS<br />
but then, without users we wouldn&#8217;t have jobs would we?</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Randy Frank</title>
		<link>http://www.gfi.com/blog/10-of-the-most-dangerous-things-to-have-on-your-network/comment-page-1/#comment-37557</link>
		<dc:creator>Randy Frank</dc:creator>
		<pubDate>Sat, 30 Jun 2012 23:23:51 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=8872#comment-37557</guid>
		<description><![CDATA[That&#039;s why an IT Administrator must be thorough and careful.  We&#039;ve have had very brilliant administrators.  By brilliant, I mean, IQ is through the roof, curiosity is almost always high.  He chatters and his thoughts run a million miles per hour.  He diagnoses quickly and effectively.  But he&#039;s messy.  His brain can&#039;t stand the mundane tasks of putting things properly at their place, and that includes applications.  He forgets that things are still running when his brain takes him to other things, worse, on things that are not even urgent.

Not only are Administrator tools dangerous in the hands of other people,  it can is extremely dangerous in the hands of thoughtless administrator.]]></description>
		<content:encoded><![CDATA[<p>That&#8217;s why an IT Administrator must be thorough and careful.  We&#8217;ve have had very brilliant administrators.  By brilliant, I mean, IQ is through the roof, curiosity is almost always high.  He chatters and his thoughts run a million miles per hour.  He diagnoses quickly and effectively.  But he&#8217;s messy.  His brain can&#8217;t stand the mundane tasks of putting things properly at their place, and that includes applications.  He forgets that things are still running when his brain takes him to other things, worse, on things that are not even urgent.</p>
<p>Not only are Administrator tools dangerous in the hands of other people,  it can is extremely dangerous in the hands of thoughtless administrator.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Ian Davis</title>
		<link>http://www.gfi.com/blog/10-of-the-most-dangerous-things-to-have-on-your-network/comment-page-1/#comment-37538</link>
		<dc:creator>Ian Davis</dc:creator>
		<pubDate>Fri, 29 Jun 2012 18:42:57 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=8872#comment-37538</guid>
		<description><![CDATA[Keyloggers are also a huge risk. When they are instaled and go unnoticed, obtaining an admin password is a piece of cake. I&#039;d put them somewhere near the top of the list because they can go enormous harm.]]></description>
		<content:encoded><![CDATA[<p>Keyloggers are also a huge risk. When they are instaled and go unnoticed, obtaining an admin password is a piece of cake. I&#8217;d put them somewhere near the top of the list because they can go enormous harm.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Frank Russo</title>
		<link>http://www.gfi.com/blog/10-of-the-most-dangerous-things-to-have-on-your-network/comment-page-1/#comment-37431</link>
		<dc:creator>Frank Russo</dc:creator>
		<pubDate>Mon, 25 Jun 2012 17:35:33 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=8872#comment-37431</guid>
		<description><![CDATA[I appreciate you pointing out that any of these things have their uses, but it&#039;s true that it&#039;s the MISuse that creates massive problems for any of these types of programs or protocols. I think if you showed this list to people who aren&#039;t IT professionals and didn&#039;t tell them what these things had in common, they might think it&#039;s some kind of employee software wishlist, but being irresponsible with any of these things can cause major problems and headaches.]]></description>
		<content:encoded><![CDATA[<p>I appreciate you pointing out that any of these things have their uses, but it&#8217;s true that it&#8217;s the MISuse that creates massive problems for any of these types of programs or protocols. I think if you showed this list to people who aren&#8217;t IT professionals and didn&#8217;t tell them what these things had in common, they might think it&#8217;s some kind of employee software wishlist, but being irresponsible with any of these things can cause major problems and headaches.</p>
]]></content:encoded>
	</item>
</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

 Served from: www.gfi.com @ 2013-08-12 08:19:23 by W3 Total Cache --