<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Talk Tech To Me - GFI Blog &#187; Andrew Zammit Tabona</title>
	<atom:link href="http://www.gfi.com/blog/author/andrew-zammit-tabona/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.gfi.com/blog</link>
	<description>Brought to you by GFI Software</description>
	<lastBuildDate>Fri, 13 Sep 2013 16:51:58 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
		<item>
		<title>Top 20 Free Digital Forensic Investigation Tools for SysAdmins</title>
		<link>http://www.gfi.com/blog/top-20-free-digital-forensic-investigation-tools-for-sysadmins/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=top-20-free-digital-forensic-investigation-tools-for-sysadmins</link>
		<comments>http://www.gfi.com/blog/top-20-free-digital-forensic-investigation-tools-for-sysadmins/#comments</comments>
		<pubDate>Mon, 02 Sep 2013 16:27:46 +0000</pubDate>
		<dc:creator>Andrew Zammit Tabona</dc:creator>
				<category><![CDATA[Tech Zone]]></category>
		<category><![CDATA[TTTM]]></category>
		<category><![CDATA[bulk_extractor]]></category>
		<category><![CDATA[CAINE]]></category>
		<category><![CDATA[DEFT]]></category>
		<category><![CDATA[Digital Forensic Investigation]]></category>
		<category><![CDATA[Digital Forensic Investigation Tools]]></category>
		<category><![CDATA[Digital Forensics Framework]]></category>
		<category><![CDATA[forensic analysis]]></category>
		<category><![CDATA[forensic image exploration]]></category>
		<category><![CDATA[forensic imaging]]></category>
		<category><![CDATA[Free Hex Editor Neo]]></category>
		<category><![CDATA[FTK Imager]]></category>
		<category><![CDATA[hard drive forensic analysis]]></category>
		<category><![CDATA[HELIX3]]></category>
		<category><![CDATA[HxD]]></category>
		<category><![CDATA[LastActivityView]]></category>
		<category><![CDATA[Linux ‘dd’]]></category>
		<category><![CDATA[mobile forensics]]></category>
		<category><![CDATA[NetSleuth]]></category>
		<category><![CDATA[Oxygen Forensics Suite]]></category>
		<category><![CDATA[P2 eXplorer]]></category>
		<category><![CDATA[PlainSight]]></category>
		<category><![CDATA[ProDiscover Basic]]></category>
		<category><![CDATA[RedLine]]></category>
		<category><![CDATA[SANS Investigative Forensic Toolkit]]></category>
		<category><![CDATA[The Sleuth Kit]]></category>
		<category><![CDATA[Volatility]]></category>
		<category><![CDATA[Xplico]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=10821</guid>
		<description><![CDATA[Here are 20 of the best free tools that will help you conduct a digital forensic investigation. Whether it’s for an internal human resources case, an investigation into unauthorized access to a server, or if you just want to learn &#8230;]]></description>
				<content:encoded><![CDATA[<p>Here are 20 of the best free tools that will help you conduct a digital forensic investigation. Whether it’s for an internal human resources case, an investigation into unauthorized access to a server, or if you just want to learn a new skill, these suites and utilities will help you conduct memory forensic analysis, hard drive forensic analysis, forensic image exploration, forensic imaging and mobile forensics. As such, they all provide the ability to bring back in-depth information about what’s “under the hood” of a system.</p>
<p>This is by no means an extensive list and may not cover everything you need for your investigation. You might also need additional utilities such a file viewers, hash generators, and text editors – checkout <b><a href="http://www.gfi.com/blog/101-free-admin-tools/">101 Free Admin Tools</a></b> for some of these. My articles on <b><a href="http://www.gfi.com/blog/top-10-free-system-troubleshooting-tools-for-sysadmins/">Top 10 Free Troubleshooting Tools for SysAdmins</a></b>, <b><a href="http://www.gfi.com/blog/the-top-20-free-network-monitoring-and-analysis-tools-for-sys-admins/">Top 20 Free Network Monitoring and Analysis Tools for Sys Admins</a> </b>and <b><a href="http://www.gfi.com/blog/the-top-20-free-file-management-tools-for-sys-admins/">Top 20 Free File Management Tools for Sys Admins</a> </b>might also come in handy since they contain a bunch of tools that can be used for Digital Forensic Investigations (e.g. BackTrack and the SysInternals Suite or the NirSoft Suite of tools).</p>
<p>Even if you may have heard of some of these tools before, I’m confident that you’ll find a gem or two amongst this list.<b></b></p>
<h2><b><a href="http://computer-forensics.sans.org/community/downloads">01 SANS SIFT</a></b></h2>
<p>The SANS Investigative Forensic Toolkit (SIFT) is an Ubuntu based Live CD which includes all the tools you need to conduct an in-depth forensic or incident response investigation. It supports analysis of Expert Witness Format (E01), Advanced Forensic Format (AFF), and RAW (dd) evidence formats. SIFT includes tools such as log2timeline for generating a timeline from system logs, Scalpel for data file carving, Rifiuti for examining the recycle bin, and lots more.</p>
<p style="text-align: center;"><a href="http://www.gfi.com/blog/wp-content/uploads/2013/09/01-SANS-SIFT.jpg"><img class="aligncenter  wp-image-10822" alt="01 SANS SIFT" src="http://www.gfi.com/blog/wp-content/uploads/2013/09/01-SANS-SIFT.jpg" width="402" height="221" /></a></p>
<p>When you first boot into the SIFT environment, I suggest you explore the documentation on the desktop to help you become accustomed to what tools are available and how to use them. There is also a good explanation of where to find evidence on a system. Use the top menu bar to open a tool, or launch it manually from a terminal window.</p>
<h2><b><a href="http://www.techpathways.com/desktopdefault.aspx?tabindex=8&amp;tabid=14">02 ProDiscover Basic</a></b></h2>
<p>ProDiscover Basic is a simple digital forensic investigation tool that allows you to image, analyse and report on evidence found on a drive. Once you add a forensic image you can view the data by content or by looking at the clusters that hold the data. You can also search for data using the Search node based on the criteria you specify.</p>
<p style="text-align: center;"><a href="http://www.gfi.com/blog/wp-content/uploads/2013/09/02-ProDiscover-Basic.jpg"><img class="aligncenter  wp-image-10823" alt="02 ProDiscover Basic" src="http://www.gfi.com/blog/wp-content/uploads/2013/09/02-ProDiscover-Basic.jpg" width="472" height="251" /></a></p>
<p>When you launch ProDiscover Basic you first need to create or load a project and add evidence from the ‘Add’ node. You can then use the ‘Content View’ or ‘Cluster View’ nodes to analyse the data and the Tools menu to perform actions against the data. Click the ‘Report’ node to view important information about the project.</p>
<h2><b><a href="https://www.volatilesystems.com/default/volatility">03 Volatility</a></b></h2>
<p>Volatility is a memory forensics framework for incident response and malware analysis that allows you to extract digital artefacts from volatile memory (RAM) dumps. Using Volatility you can extract information about running processes, open network sockets and network connections, DLLs loaded for each process, cached registry hives, process IDs, and more.</p>
<p style="text-align: center;"><a href="http://www.gfi.com/blog/wp-content/uploads/2013/09/03-Volatility.jpg"><img class="aligncenter  wp-image-10824" alt="03 Volatility" src="http://www.gfi.com/blog/wp-content/uploads/2013/09/03-Volatility.jpg" width="473" height="113" /></a></p>
<p>If you are using the standalone Windows executable version of Volatility, simply place volatility-2.1.standalone.exe into a folder and open a command prompt window. From the command prompt, navigate to the location of the executable file and type “volatility-2.1.standalone.exe –f &lt;FILENAME&gt; &#8211;profile=&lt;PROFILENAME&gt; &lt;PLUGINNAME&gt;” without quotes – FILENAME would be the name of the memory dump file you wish to analyse, PROFILENAME would be the machine the memory dump was taken on and PLUGINNAME would be the name of the plugin you wish to use to extract information.</p>
<p><b>Note:</b> In the example above I am using the ‘connscan’ plugin to search the physical memory dump for TCP connection information.</p>
<h2><b><a href="http://www.sleuthkit.org/">04 The Sleuth Kit (+Autopsy)</a></b></h2>
<p>The Sleuth Kit is an open source digital forensics toolkit that can be used to perform in-depth analysis of various file systems. Autopsy is essentially a GUI that sits on top of The Sleuth Kit. It comes with features like Timeline Analysis, Hash Filtering, File System Analysis and Keyword Searching out of the box, with the ability to add other modules for extended functionality.</p>
<p><b>Note: </b>You can use The Sleuth Kit if you are running a Linux box and Autopsy if you are running a Windows box.</p>
<p style="text-align: center;"><a href="http://www.gfi.com/blog/wp-content/uploads/2013/09/1.jpg"><img class="aligncenter  wp-image-10827" alt="1" src="http://www.gfi.com/blog/wp-content/uploads/2013/09/1.jpg" width="506" height="311" /></a></p>
<p>When you launch Autopsy, you can choose to create a new case or load an existing one. If you choose to create a new case you will need to load a forensic image or a local disk to start your analysis. Once the analysis process is complete, use the nodes on the left hand pane to choose which results to view.</p>
<h2><b><a href="http://www.accessdata.com/support/product-downloads">05 FTK Imager</a></b></h2>
<p>FTK Imager is a data preview and imaging tool that allows you to examine files and folders on local hard drives, network drives, CDs/DVDs, and review the content of forensic images or memory dumps. Using FTK Imager you can also create SHA1 or MD5 hashes of files, export files and folders from forensic images to disk, review and recover files that were deleted from the Recycle Bin (providing that their data blocks haven’t been overwritten), and mount a forensic image to view its contents in Windows Explorer.</p>
<p><b>Note:</b> There is a portable version of FTK Imager that will allow you to run it from a USB disk.</p>
<p style="text-align: center;"><a href="http://www.gfi.com/blog/wp-content/uploads/2013/09/2.jpg"><img class="aligncenter  wp-image-10829" alt="2" src="http://www.gfi.com/blog/wp-content/uploads/2013/09/2.jpg" width="507" height="460" /></a></p>
<p>When you launch FTK Imager, go to ‘File &gt; Add Evidence Item…’ to load a piece of evidence for review. To create a forensic image, go to ‘File &gt; Create Disk Image…’ and choose which source you wish to forensically image.</p>
<h2><b>06 Linux ‘dd’</b></h2>
<p>dd comes by default on the majority of Linux distributions available today (e.g. Ubuntu, Fedora). This tool can be used for various digital forensic tasks such as forensically wiping a drive (zero-ing out a drive) and creating a raw image of a drive.</p>
<p><b>Note:</b> dd is a very powerful tool that can have devastating effects if not used with care. It is recommended that you experiment in a safe environment before using this tool in the real world.</p>
<p><b>Tip:</b> A modified version of dd is available from <a href="http://sourceforge.net/projects/dc3dd/">http://sourceforge.net/projects/dc3dd/</a> &#8211; dc3dd includes additional features that were added specifically for digital forensic acquisition tasks.</p>
<p style="text-align: center;"><a href="http://www.gfi.com/blog/wp-content/uploads/2013/09/3.jpg"><img class="aligncenter  wp-image-10831" alt="3" src="http://www.gfi.com/blog/wp-content/uploads/2013/09/3.jpg" width="490" height="313" /></a></p>
<p>To use dd, simply open a terminal window and type dd followed by a set of command parameters (which command parameters will obviously depend on what you want to do). The basic dd syntax for forensically wiping a drive is:</p>
<p>dd if=/dev/zero of=/dev/sdb1 bs=1024<br />
<b><br />
</b>where if = input file, of = output file, bs = byte size</p>
<p><b>Note:</b> Replace /dev/sdb1 with the drive name of the drive you want to forensically wipe and 1024 with the size of the byte blocks you want to write out.</p>
<p>The basic dd syntax for creating a forensic image of a drive is:</p>
<p>dd if=/dev/sdb1 of=/home/andrew/newimage.dd bs=512 conv=noerror,sync</p>
<p>where if = input file (or in this case drive), of = output file, bs = byte size, conv = conversion options</p>
<p><b>Tip:</b> For additional usage info, from a terminal window, type “man dd” without quotes to bring up the help manual for the dd command.</p>
<h2><b><a href="http://www.caine-live.net/page5/page5.html">07 CAINE</a></b></h2>
<p>CAINE (Computer Aided INvestigative Environment) is Linux Live CD that contains a wealth of digital forensic tools. Features include a user-friendly GUI, semi-automated report creation and tools for Mobile Forensics, Network Forensics, Data Recovery and more.</p>
<p style="text-align: center;"><a href="http://www.gfi.com/blog/wp-content/uploads/2013/09/4.jpg"><img class="aligncenter  wp-image-10832" alt="4" src="http://www.gfi.com/blog/wp-content/uploads/2013/09/4.jpg" width="508" height="382" /></a></p>
<p>When you boot into the CAINE Linux environment, you can launch the digital forensic tools from the CAINE interface (shortcut on the desktop) or from each tool’s shortcut in the ‘Forensic Tools’ folder on the applications menu bar.</p>
<h2><b><a href="http://www.oxygen-forensic.com/en/download/freeware">08 Oxygen Forensic Suite 2013 Standard</a></b></h2>
<p>If you are investigating a case that requires you to gather evidence from a mobile phone to support your case, Oxygen Forensics Suite (Standard Edition) is a tool that will help you achieve this. Features include the ability to gather Device Information (Manufacturer, OS Platform, IMEI, Serial Number, etc.), Contacts, Messages (Emails, SMS, MMS, etc.) and recovery of deleted messages, Call Logs, and Calendar and Task information. It also comes with a file browser which allows you to access and analyse user photos, videos, documents and device databases.</p>
<p style="text-align: center;"><a href="http://www.gfi.com/blog/wp-content/uploads/2013/09/5.jpg"><img class="aligncenter  wp-image-10833" alt="5" src="http://www.gfi.com/blog/wp-content/uploads/2013/09/5.jpg" width="507" height="354" /></a></p>
<p>When you launch Oxygen Forensic Suite, hit the ‘Connect new device’ button on the top menu bar to launch the Oxygen Forensic Extractor wizard that guides you through selecting the device and type of information you wish to extract.</p>
<h2><b><a href="http://www.hhdsoftware.com/free-hex-editor">09 Free Hex Editor Neo</a></b></h2>
<p>Free Hex Editor Neo is a basic hex editor that was designed to handle very large files. While a lot of the additional features are found in the commercial versions of Hex Editor Neo, I find this tool useful for loading large files (e.g. database files or forensic images) and performing actions such as manual data carving, low-level file editing, information gathering, or searching for hidden data.</p>
<p style="text-align: center;"><a href="http://www.gfi.com/blog/wp-content/uploads/2013/09/9.jpg"><img class="aligncenter  wp-image-10834" alt="9" src="http://www.gfi.com/blog/wp-content/uploads/2013/09/9.jpg" width="508" height="393" /></a></p>
<p>Use ‘File &gt; Open’ to load a file into Hex Editor Neo. The data will appear in the middle window where you can begin to navigate through the hex manually or press CTRL + F to run a search.</p>
<h2><b><a href="http://www.forensicswiki.org/wiki/Bulk_extractor">10 Bulk Extractor</a></b></h2>
<p>bulk_extractor is a computer forensics tool that scans a disk image, file, or directory of files and extracts information such as credit card numbers, domains, e-mail addresses, URLs, and ZIP files. The extracted information is output to a series of text files (which can be reviewed manually or analysed using other forensics tools or scripts).</p>
<p><b>Tip:</b> Within the output text files you will find entries for data that resemble a credit card number, e-mail address, domain name, etc. You will also see a decimal value in the first column of the text file that, when converted to hex, can be used as the pointer on disk where the entry was found (i.e. if you were analysing the disk manually using a hex editor for example, you would jump to this hexadecimal value to view the data).</p>
<p style="text-align: center;"><a href="http://www.gfi.com/blog/wp-content/uploads/2013/09/10.jpg"><img class="aligncenter  wp-image-10835" alt="10" src="http://www.gfi.com/blog/wp-content/uploads/2013/09/10.jpg" width="508" height="401" /></a></p>
<p>Bulk_extractor comes as a command-line tool or a GUI tool. In the example above I set the bulk extractor tool to extract information from a forensics image I took earlier and output the results to a folder called “BE_Output”. The results can then be viewed in the Bulk Extractor Viewer and the output text files mentioned above.</p>
<h2><b><a href="http://www.deftlinux.net/download/">11 DEFT</a></b></h2>
<p>DEFT is another Linux Live CD which bundles some of the most popular free and open source computer forensic tools available. It aims to help with Incident Response, Cyber Intelligence and Computer Forensics scenarios. Amongst others, it contains tools for Mobile Forensics, Network Forensics, Data Recovery, and Hashing.</p>
<p style="text-align: center;"><a href="http://www.gfi.com/blog/wp-content/uploads/2013/09/11.jpg"><img class="aligncenter  wp-image-10836" alt="11" src="http://www.gfi.com/blog/wp-content/uploads/2013/09/11.jpg" width="508" height="384" /></a></p>
<p>When you boot using DEFT, you are asked whether you wish to load the live environment or install DEFT to disk. If you load the live environment you can use the shortcuts on the application menu bar to launch the required tools.</p>
<h2><b><a href="http://www.xplico.org/download">12 Xplico</a></b></h2>
<p>Xplico is an open source Network Forensic Analysis Tool (NFAT) that aims to extract applications data from internet traffic (e.g. Xplico can extract an e-mail message from POP, IMAP or SMTP traffic). Features include support for a multitude of protocols (e.g. HTTP, SIP, IMAP, TCP, UDP), TCP reassembly, and the ability to output data to a MySQL or SQLite database, amongst others.</p>
<p style="text-align: center;"><a href="http://www.gfi.com/blog/wp-content/uploads/2013/09/12.jpg"><img class="aligncenter  wp-image-10837" alt="12" src="http://www.gfi.com/blog/wp-content/uploads/2013/09/12.jpg" width="508" height="259" /></a></p>
<p>Once you’ve installed Xplico, access the web interface by navigating to http://&lt;IPADDRESS&gt;:9876 and logging in with a normal user account. The first thing you need to do is create a case and add a new session. When you create a new session you can either load a PCAP file (acquired from Wireshark for example) or start a live capture. Once the session has finished decoding, use the navigation menu on the left hand side to view the results.</p>
<h2><b><a href="http://www.nirsoft.net/utils/computer_activity_view.html">13 LastActivityView</a></b></h2>
<p>I briefly touched on LastActivityView when pointing out the NirSoft suite of tools in my <a href="http://www.gfi.com/blog/top-10-free-system-troubleshooting-tools-for-sysadmins/" target="_blank"><b>Top 10 Free System Troubleshooting Tools for SysAdmins </b></a>article. LastActivityView allows you to view what actions were taken by a user and what events occurred on the machine. Any activities such as running an executable file, opening a file/folder from Explorer, an application or system crash or a user performing a software installation will be logged. The information can be exported to a CSV / XML / HTML file. This tool is useful when you need to prove that a user (or account) performed an action he or she said they didn’t.</p>
<p style="text-align: center;"><a href="http://www.gfi.com/blog/wp-content/uploads/2013/09/13.jpg"><img class="aligncenter  wp-image-10838" alt="13" src="http://www.gfi.com/blog/wp-content/uploads/2013/09/13.jpg" width="507" height="293" /></a></p>
<p>When you launch LastActivityView, it will immediately start displaying a list of actions taken on the machine it is being run on. Sort by action time or use the search button to start investigating what actions were taken on the machine.</p>
<h2><b><a href="http://www.digital-forensic.org/">14 Digital Forensic Framework</a></b></h2>
<p>The Digital Forensics Framework (DFF) is a digital forensic investigation tool and a development platform that allows you to collect, preserve and reveal digital evidence. Amongst others, DFF&#8217;s features include the ability to read RAW, EWF and AFF forensic file formats, access local and remote devices, analyse registry, mailbox and file system data and recover hidden and deleted files.</p>
<p style="text-align: center;"><a href="http://www.gfi.com/blog/wp-content/uploads/2013/09/14.jpg"><img class="aligncenter  wp-image-10839" alt="14" src="http://www.gfi.com/blog/wp-content/uploads/2013/09/14.jpg" width="507" height="282" /></a></p>
<p>When you launch DFF, you first need to load an evidence file (i.e. a forensic image you acquired previously) or open a device ready for analysis. You can then process the evidence file or device against one of the in-built modules to begin analysing data.</p>
<h2><b><a href="https://www.mandiant.com/resources/download/redline">15 Mandiant RedLine</a></b></h2>
<p>RedLine offers the ability to perform memory and file analysis of a specific host. It collects information about running processes and drivers from memory, and gathers file system metadata, registry data, event logs, network information, services, tasks, and Internet history to help build an overall threat assessment profile.</p>
<p style="text-align: center;"><a href="http://www.gfi.com/blog/wp-content/uploads/2013/09/15.jpg"><img class="aligncenter  wp-image-10840" alt="15" src="http://www.gfi.com/blog/wp-content/uploads/2013/09/15.jpg" width="508" height="312" /></a></p>
<p>When you launch RedLine, you will be given a choice to Collect Data or Analyze Data. Unless you already have a memory dump file available, you’ll need to create a collector to gather data from the machine and let that process run through to completion. Once you have a memory dump file to hand you can begin your analysis.</p>
<h2><b><a href="http://www.plainsight.info/index.html">16 PlainSight</a></b></h2>
<p>PlainSight is a Live CD based on Knoppix (a Linux distribution) that allows you to perform digital forensic tasks such as viewing internet histories, data carving, USB device usage information gathering, examining physical memory dumps, extracting password hashes, and more.</p>
<p style="text-align: center;"><a href="http://www.gfi.com/blog/wp-content/uploads/2013/09/16.jpg"><img class="aligncenter  wp-image-10841" alt="16" src="http://www.gfi.com/blog/wp-content/uploads/2013/09/16.jpg" width="509" height="383" /></a></p>
<p>When you boot into PlainSight, a window pops up asking you to select whether you want to perform a scan, load a file or run the wizard. Enter a selection to begin the data extraction and analysis process.</p>
<h2><b><a href="http://mh-nexus.de/en/hxd/">17 HxD</a></b></h2>
<p>HxD is one of my personal favourites. It is a user-friendly hex editor that allows you to perform low-level editing and modifying of a raw disk or main memory (RAM). HxD was designed with easy-of-use and performance in mind and can handle large files without issue. Features include searching and replacing, exporting, checksums/digests, an in-built file shredder, concatenation or splitting of files, generation of statistics and more.</p>
<p style="text-align: center;"><a href="http://www.gfi.com/blog/wp-content/uploads/2013/09/17.jpg"><img class="aligncenter  wp-image-10842" alt="17" src="http://www.gfi.com/blog/wp-content/uploads/2013/09/17.jpg" width="473" height="451" /></a></p>
<p>From the HxD interface start your analysis by opening a file from ‘File &gt; Open’, loading a disk from ‘Extras &gt; Open disk…’ or loading a RAM process from ‘Extras &gt; Open RAM&#8230;’.</p>
<h2><b><a href="http://www.e-fense.com/products.php">18 HELIX3 Free</a></b></h2>
<p>HELIX3 is a Live CD based on Linux that was built to be used in Incident Response, Computer Forensics and E-Discovery scenarios. It is packed with a bunch of open source tools ranging from hex editors to data carving software to password cracking utilities, and more.</p>
<p><b>Note:</b> The HELIX3 version you need is 2009R1. This version was the last free version available before HELIX was taken over by a commercial vendor. HELIX3 2009R1 is still valid today and makes for a useful addition to your digital forensics toolkit.</p>
<p style="text-align: center;"><a href="http://www.gfi.com/blog/wp-content/uploads/2013/09/18.jpg"><img class="aligncenter  wp-image-10843" alt="18" src="http://www.gfi.com/blog/wp-content/uploads/2013/09/18.jpg" width="475" height="359" /></a></p>
<p>When you boot using HELIX3, you are asked whether you want to load the GUI environment or install HELIX3 to disk. If you choose to load the GUI environment directly (recommended), a Linux-based screen will appear giving you the option to run the graphical version of the bundled tools.</p>
<h2><b><a href="http://netgrab.co.uk/netsleuth/download-netsleuth/">19 NetSleuth</a></b></h2>
<p>NetSleuth is a network forensics analysis tool that identifies devices on your network. It operates in &#8216;live&#8217; mode (where it will actively capture network packets and interpret device information) or in &#8216;offline&#8217; mode where it will process a PCAP file that you import.</p>
<p><b>Note: </b>At the time of writing, NetSleuth is in BETA. It is not recommended that you run this in a production environment. It made this list because it promises to be a handy addition to your forensic toolkit. The author of this tool is currently asking for feedback from the community so now is your chance to contribute!</p>
<p style="text-align: center;"><a href="http://www.gfi.com/blog/wp-content/uploads/2013/09/19.jpg"><img class="aligncenter  wp-image-10844" alt="19" src="http://www.gfi.com/blog/wp-content/uploads/2013/09/19.jpg" width="475" height="295" /></a></p>
<p>When you launch NetSleuth, you can either initiate a ‘live’ analysis from the Live Capture tab, or load a PCAP file from the Offline Analysis tab. Once NetSleuth has identified at least one device, you can double click on it to open the Device Information window.</p>
<h2><strong><b><a href="http://www.paraben.com/p2-explorer.html">20 P2 eXplorer Free</a></b></strong></h2>
<p>P2 eXplorer is a forensic image mounting tool that allows you to mount a forensic image as a physical disk and view the contents of that image in Windows Explorer or load it into an external forensic analysis tool. P2 eXplorer supports images in RAW, DD, IMG, EX01, SMART and SafeBack format, amongst others.</p>
<p style="text-align: center;"><a href="http://www.gfi.com/blog/wp-content/uploads/2013/09/20.jpg"><img class="aligncenter  wp-image-10845" alt="20" src="http://www.gfi.com/blog/wp-content/uploads/2013/09/20.jpg" width="475" height="295" /></a></p>
<p>When you launch P2 eXplorer, choose an available drive letter to mount the image to and click ‘File &gt; Mount Image…’ to choose the image to mount. Once the image has been mounted, double click on the associated drive letter to view the contents of that image in Windows Explorer.<strong></strong></p>
<p><b>Tip:</b> In <b><a href="http://www.gfi.com/blog/top-20-free-disk-tools-for-sysadmins/">Top 20 Free Disk Tools for SysAdmins</a></b> I mentioned another image mounting tool called OSFMount. OSFMount is very similar to P2 eXplorer but also supports the mounting of VMWare files and the creation of RAM disks. Part of the OSFMount family is a digital forensics suite called OSForensics – the freeware version of this application is available for personal, educational or home use to allow you to experiment and become acquainted with digital forensics concepts.</p>
<p><strong><em>Like our posts? Subscribe to our <a href="http://feeds.feedburner.com/TalkTechToMe-All">RSS feed</a> or email feed (on the right hand side) now, and be the first to get them!</em></strong></p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/top-20-free-digital-forensic-investigation-tools-for-sysadmins/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Top 10 Free System Troubleshooting Tools for SysAdmins</title>
		<link>http://www.gfi.com/blog/top-10-free-system-troubleshooting-tools-for-sysadmins/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=top-10-free-system-troubleshooting-tools-for-sysadmins</link>
		<comments>http://www.gfi.com/blog/top-10-free-system-troubleshooting-tools-for-sysadmins/#comments</comments>
		<pubDate>Sun, 28 Jul 2013 13:00:45 +0000</pubDate>
		<dc:creator>Andrew Zammit Tabona</dc:creator>
				<category><![CDATA[Tech Zone]]></category>
		<category><![CDATA[TTTM]]></category>
		<category><![CDATA[AccExp]]></category>
		<category><![CDATA[CurrPorts]]></category>
		<category><![CDATA[Joeware Utilities]]></category>
		<category><![CDATA[LastActivityView]]></category>
		<category><![CDATA[Microsoft Fix It Solution Center]]></category>
		<category><![CDATA[Microsoft SysInternals Suite]]></category>
		<category><![CDATA[NirLauncher]]></category>
		<category><![CDATA[PowerShell Troubleshooting Packs]]></category>
		<category><![CDATA[Problem Steps Recorder]]></category>
		<category><![CDATA[psr.exe]]></category>
		<category><![CDATA[Reliability Monitor]]></category>
		<category><![CDATA[SidToName]]></category>
		<category><![CDATA[SysAdmins]]></category>
		<category><![CDATA[system troubleshooting]]></category>
		<category><![CDATA[system troubleshooting tools]]></category>
		<category><![CDATA[troubleshooting tools]]></category>
		<category><![CDATA[USBDeview]]></category>
		<category><![CDATA[WELT]]></category>
		<category><![CDATA[WinAudit]]></category>
		<category><![CDATA[WSCC]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=10733</guid>
		<description><![CDATA[To conclude our SysAdmin Week series, we thought of sharing 10 of the best free tools / packages for troubleshooting system issues – one of the biggest headaches for sys admins! These tools should help you, as an admin, to &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/FBSysAdminWeekday7.jpg"><img class=" wp-image-10751 alignright" style="border: 0px solid black; margin: 10px;" alt="FBSysAdminWeekday7" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/FBSysAdminWeekday7-300x300.jpg" width="240" height="240" /></a>To conclude our SysAdmin Week series, we thought of sharing 10 of the best free tools / packages for troubleshooting system issues – one of the biggest headaches for sys admins! These tools should help you, as an admin, to fix the problem or identify the root cause more quickly. You can either use these tools yourself, or provide them to a user who is experiencing the issue, for them to gather the information needed. Even if you may have heard of some of these tools before, I’m confident that you’ll find a gem or two on this list.<span id="more-10733"></span></p>
<h2>1. <a href="http://support.microsoft.com/fixit/">Microsoft Fix It Solution Center</a></h2>
<p>The Microsoft Fix It Solution Center is an online tool that helps you to quickly find and fix common system issues. Once you’ve entered the symptoms, you can either download an executable to automatically fix the issue or be directed to a relevant Microsoft Knowledgebase Article that explains what the cause and recommend workaround is.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/MicrosoftFixIt1.png"><img class="aligncenter size-medium wp-image-10735" alt="MicrosoftFixIt" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/MicrosoftFixIt1-300x269.png" width="300" height="269" /></a></p>
<p>To use the Microsoft Fix It Solution Center, simply open <a href="http://support.microsoft.com/fixit/">http://support.microsoft.com/fixit/</a> in a web browser, select a problem area from “Step 1”, choose what type of problem you are trying to fix from the list in “Step 2” and then choose which solution you’d like to execute or learn more about from “Step 3”.</p>
<h2>2. Problem Steps Recorder</h2>
<p>Hidden away in Windows 7 / Windows 2008 and above is a neat little utility called Problem Steps Recorder (psr.exe). The Problem Steps Recorder will record the step-by-step interactions that occur while the user replicates the problem, taking screenshots of every action. It then bundles all this into a report with detailed information and any relevant error logs.</p>
<p>This tool is great if you have a user in your environment who is experiencing an issue that you want to gain more information about and the steps they took to reproduce the problem, or if you want to create a report to send to a third party vendor as part of a support case.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/ProblemStepsRecorder.png"><img class="aligncenter size-medium wp-image-10736" alt="ProblemStepsRecorder" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/ProblemStepsRecorder-300x46.png" width="300" height="46" /></a></p>
<p>To launch the Problem Steps Recorder, go to the Start menu and type “psr.exe”. Click “Start Record” and the tool will record every interaction from then on. You can add comments during the recording process and then click “Stop Record” to save the report as an *.mht file within a zip archive.</p>
<h2>3. Reliability Monitor</h2>
<p>Windows Vista / 2008 and above include a tool called Reliability Monitor. This tool provides an overview of overall system stability and details about events that can impact reliability. The idea is to pinpoint any troublesome areas and take steps to improve system reliability based on what you learn (e.g. you might identify a trend in a certain application crashing when opening a certain file type).</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/MicrosoftReliabilityMonitor.png"><img class="aligncenter size-medium wp-image-10737" alt="MicrosoftReliabilityMonitor" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/MicrosoftReliabilityMonitor-300x175.png" width="300" height="175" /></a></p>
<p>To run the Microsoft Reliability Monitor, go to the Start menu and type ‘Reliability’. This will bring up a “View reliability history” shortcut. Clicking on this shortcut will launch the Reliability Monitor directly. You can also launch this tool from the Performance Monitor tool by right clicking on Monitoring Tools and selecting “View system reliability”.</p>
<p>Start by selecting whether you want to view information by Days or Weeks, and then click on a specific area within the graph to view information in the bottom hand pane. Once you’ve viewed reliability history for a specified period, you can choose to save the information to a file, view a list of all problem reports and check for solutions to problems.</p>
<h2>4. <a href="http://www.gunnerinc.com/welt.htm">WELT (Windows Error Lookup Tool)</a></h2>
<p>When troubleshooting issues, you may come across Win32, HRESULT, NTSTATUS or STOP error codes which are likely to mean nothing to you or I. Using WELT you can find out what the error code means in plain English and what it relates to.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/WELT.png"><img class="aligncenter size-medium wp-image-10738" alt="WELT" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/WELT-300x163.png" width="300" height="163" /></a></p>
<p>To launch WELT, simply execute Windows Error Lookup Tool.exe from the folder where you extracted welt.zip to. Enter the error code in the textbox and the error details will appear automatically.</p>
<h2>5. PowerShell Troubleshooting Packs</h2>
<p>As I mentioned in my article entitled <a href="http://www.gfi.com/blog/windows-powershell-essential-admin-scripts-part-1/">Windows PowerShell™: Essential Admin Scripts (Part 1)</a> the PowerShell Troubleshooting Packs (bundled with Windows 7/2008 and above) can be really handy when troubleshooting system issues. As such, they are a collection of PowerShell scripts that you can use to diagnose different aspects of your servers, clients or network. Different packages are available to troubleshoot printers, networks, performance, power, Windows Update, etc.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/TroubleshootingPacks.png"><img class="aligncenter size-medium wp-image-10739" alt="TroubleshootingPacks" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/TroubleshootingPacks-300x137.png" width="300" height="137" /></a></p>
<p>To run a PowerShell Troubleshooting Pack, open a PowerShell command prompt and import the modules associated with the pack by running the “Import-Module TroubleshootingPack” command. Then, run the following command to start the desired Troubleshooting Pack:</p>
<p>Get-TroubleshootingPack &lt;TroubleshootingPackLocation&gt; | Invoke-TroubleshootingPack</p>
<h2>6. <a href="http://www.pxserver.com/WinAudit.htm">WinAudit</a></h2>
<p>As part of the troubleshooting process, it is helpful to know as much information as you can about the machine where the problem resides to assist in finding a solution more quickly. WinAudit scans your computer and gathers a whole raft of information about Installed Software, TCP/IP settings, Drives, Error Logs, etc.</p>
<p><b>Note:</b> At the time of writing, the download link available from the developer’s website was broken. You can download the latest version of this software from a popular application download site like CNET.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/WinAudit.png"><img class="aligncenter size-medium wp-image-10740" alt="WinAudit" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/WinAudit-300x174.png" width="300" height="174" /></a></p>
<p>To start an audit of your local machine, simply execute WinAudit.exe to start the application and then click the “Audit” icon in the top left hand corner.  Once the audit is complete, you can start to review the information from the different categories in the left hand pane, or save the information as a PDF / CSV / TXT / HTML file.</p>
<h2>7. <a href="http://www.joeware.net/freetools/index.htm">Joeware Utilities</a></h2>
<p>Joeware Utilities are a list of free troubleshooting and system information utilities aimed at making the life of an administrator easier. These tools are built by a system administrator from his own experience of not finding a tool out there that did the job he needed for whatever he was trying to solve. The tools available include anything from tools that dump user information from Active Directory, modify a user account’s expiration flag or perform TCP/IP port connection testing.</p>
<p><b>Note:</b> Unfortunately Joeware Utilities do not come as a bundled package and will have to be downloaded individually from the website. However, using a small add-on for the NirLauncher application mention below, you can download and categorize the tools ready to be launched from the NirLauncher application itself.</p>
<p>Some of the tools available from Joeware Utilities include:</p>
<p><b><i>SidToName</i></b></p>
<p>SidToName is a command line tool that resolves SIDs (Security Identifiers) to friendly display names. You provide it with a valid SID and it returns the object name associated with that SID.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/SidToName.png"><img class="aligncenter size-medium wp-image-10741" alt="SidToName" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/SidToName-300x148.png" width="300" height="148" /></a></p>
<p><b><i>AccExp</i></b></p>
<p>AccExp is a command line tool that you can use to modify or read the expiration date of local user accounts.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/AccExp.png"><img class="aligncenter size-medium wp-image-10742" alt="AccExp" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/AccExp-300x148.png" width="300" height="148" /></a></p>
<h2>8. <a href="http://launcher.nirsoft.net/download.html">Nirsoft NirLauncher</a></h2>
<p>NirLauncher is an application that bundles more than 170 portable freeware utilities. The tools available include password recovery tools, Internet tools, programming tools, and system tools – all of which can be used for troubleshooting and information gathering.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/NirLauncher.png"><img class="aligncenter size-medium wp-image-10743" alt="NirLauncher" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/NirLauncher-300x229.png" width="300" height="229" /></a></p>
<p>Some of the most popular tools bundled with NirSoft NirLauncher include:</p>
<p><b><i>USBDeview</i></b></p>
<p>USBDeview is a small application that lists all current and previously connected USB devices on a local or remote machine. USB device information includes device name/description, device type, serial number, the date/time that the device was added or last used, VendorID, etc.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/USBDeview.png"><img class="aligncenter size-medium wp-image-10744" alt="USBDeview" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/USBDeview-300x135.png" width="300" height="135" /></a></p>
<p><b><i>CurrPorts</i></b></p>
<p>CurrPorts displays a list of all currently open TCP/UDP ports on the local machine. Information about which process opened the port, the time the process was created and the user that created it is displayed. Using CurrPorts you can also close open connections and export the information to a file.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/CurrPorts.png"><img class="aligncenter size-medium wp-image-10745" alt="CurrPorts" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/CurrPorts-300x200.png" width="300" height="200" /></a></p>
<p><b><i>LastActivityView</i></b></p>
<p>Using LastActivityView you can see what actions were taken by a user and what events occurred on the machine. Any activities such as running an executable file, opening a file/folder from Explorer or performing a software installation will be logged. The information can be exported to a CSV / XML / HTML file.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/LastActivityView.png"><img class="aligncenter size-medium wp-image-10746" alt="LastActivityView" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/LastActivityView-300x257.png" width="300" height="257" /></a></p>
<h2>9. <a href="http://technet.microsoft.com/en-gb/sysinternals/bb842062.aspx">Microsoft SysInternals Suite</a></h2>
<p>Microsoft SysInternals Suite is a collection of over 60 lightweight troubleshooting tools all bundled into a single download package. Whatever issue you’re trying to tackle, you are sure to find a tool in this package to help you manage, troubleshoot and diagnose your systems and applications.</p>
<p>Some of the most popular tools bundled in the SysInternals Suite include:</p>
<p><b><i>Autoruns</i></b></p>
<p>Autoruns allows you to view which programs and services are configured to run at system boot up or login, in the order in which Windows processes them.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/Autoruns.png"><img class="aligncenter size-medium wp-image-10747" alt="Autoruns" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/Autoruns-300x213.png" width="300" height="213" /></a></p>
<p><b><i>Process Monitor</i></b></p>
<p>Using Process Monitor you can troubleshoot application and system related issues by monitoring activity related to processes, threads, DLLs, the registry and file system in real-time.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/ProcessMonitor.png"><img class="aligncenter size-medium wp-image-10748" alt="ProcessMonitor" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/ProcessMonitor-300x214.png" width="300" height="214" /></a></p>
<p><b><i>AccessEnum</i></b></p>
<p>Using AccessEnum you can quickly view permissions of file system directories or registry keys and then save the results to a text file and compare results with a previously saved log.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/AccessEnum.png"><img class="aligncenter size-medium wp-image-10749" alt="AccessEnum" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/AccessEnum-300x154.png" width="300" height="154" /></a></p>
<h2>10. <a href="http://www.kls-soft.com/wscc/downloads.php">WSCC (Windows System Control Center)</a></h2>
<p>WSCC is not a troubleshooting tool per se, but it does facilitate issue troubleshooting by acting as an inventory for various system troubleshooting tool suites (such as those from Microsoft SysInternals and NirSoft). It allows you to install, update, execute and categorize the entire collection of tools in a single location.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/WSCC.png"><img class="aligncenter size-medium wp-image-10750" alt="WSCC" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/WSCC-300x294.png" width="300" height="294" /></a></p>
<p>When you launch WSCC for the first time, you are given the option to download and install the latest versions of the entire set of over 270 tools. If you choose not to install them locally, WSCC will download each application when you first click on it and store the file in a temp folder within the WSCC directory. To launch a troubleshooting tool, choose a tool from the category within the navigation pane on the left hand side. You can also add favourite tools to the Favourites folder or search for a utility by name.</p>
<p>Are there any free tools not on this list that you’ve found useful and would like to share with the community?</p>
<p><em><strong>Like our posts? Subscribe to our <a href="http://feeds.feedburner.com/TalkTechToMe-All">RSS feed</a> or email feed (on the right hand side) now, and be the first to get them!</strong></em></p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/top-10-free-system-troubleshooting-tools-for-sysadmins/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
		<item>
		<title>The Top 20 Free File Management Tools for Sys Admins</title>
		<link>http://www.gfi.com/blog/the-top-20-free-file-management-tools-for-sys-admins/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-top-20-free-file-management-tools-for-sys-admins</link>
		<comments>http://www.gfi.com/blog/the-top-20-free-file-management-tools-for-sys-admins/#comments</comments>
		<pubDate>Wed, 24 Jul 2013 14:45:33 +0000</pubDate>
		<dc:creator>Andrew Zammit Tabona</dc:creator>
				<category><![CDATA[Tech Zone]]></category>
		<category><![CDATA[TTTM]]></category>
		<category><![CDATA[7-Zip]]></category>
		<category><![CDATA[Advanced Remaner Portable]]></category>
		<category><![CDATA[archiving]]></category>
		<category><![CDATA[AxCrypt]]></category>
		<category><![CDATA[Better Explorer]]></category>
		<category><![CDATA[Bulk Rename Utility]]></category>
		<category><![CDATA[copying]]></category>
		<category><![CDATA[de-duplication]]></category>
		<category><![CDATA[Duplicate Cleaner]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[ExamDiff]]></category>
		<category><![CDATA[file comparison]]></category>
		<category><![CDATA[File Management Tools]]></category>
		<category><![CDATA[File Splitter]]></category>
		<category><![CDATA[Free Opener]]></category>
		<category><![CDATA[FreeFileSync]]></category>
		<category><![CDATA[Hash Tool]]></category>
		<category><![CDATA[Locate32]]></category>
		<category><![CDATA[merging]]></category>
		<category><![CDATA[My Lockbox]]></category>
		<category><![CDATA[PeaZip]]></category>
		<category><![CDATA[renaming]]></category>
		<category><![CDATA[search]]></category>
		<category><![CDATA[SearchMyFiles]]></category>
		<category><![CDATA[Steganos LockNote]]></category>
		<category><![CDATA[syncing]]></category>
		<category><![CDATA[SyncToy]]></category>
		<category><![CDATA[Sys Admins]]></category>
		<category><![CDATA[TeraCopy]]></category>
		<category><![CDATA[Universal Extractor]]></category>
		<category><![CDATA[WinMerge]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=10701</guid>
		<description><![CDATA[Following yesterday’s post, we have compiled another list of free tools for sys admins. Today’s list presents 20 of the best free tools for file comparison, archiving, encryption, renaming, de-duplication, merging, copying, syncing and search. Even if you may have &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/FBSysAdminWeekday3a.jpg"><img class=" wp-image-10723 alignright" style="border: 0px solid black; margin: 10px;" alt="FBSysAdminWeekday3a" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/FBSysAdminWeekday3a-300x300.jpg" width="180" height="180" /></a>Following <a href="http://www.gfi.com/blog/the-top-20-free-network-monitoring-and-analysis-tools-for-sys-admins/">yesterday’s post</a>, we have compiled another list of free tools for sys admins. Today’s list presents 20 of the best free tools for file comparison, archiving, encryption, renaming, de-duplication, merging, copying, syncing and search. Even if you may have heard of some of these tools before, we’re confident that you’ll find a gem or two amongst this list – and if you know of any others, leave us a comment below!<span id="more-10701"></span><b></b></p>
<p><b>1. <a href="http://codesector.com/teracopy">TeraCopy</a></b></p>
<p>TeraCopy acts as an alternative to the built-in copy and move process in Windows. It is designed to copy and move files either locally or over the network at a faster rate. It allows you to pause and resume file transfer activities, it integrates into the Windows shell and has an automatic error recovery mechanism in case something goes wrong during the transfer process.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/TeraCopy.png"><img class="aligncenter size-medium wp-image-10702" alt="TeraCopy" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/TeraCopy-300x185.png" width="300" height="185" /></a></p>
<p>Once you’ve installed TeraCopy, you can launch the application from the Start Menu or by right clicking on a file or folder and selecting “TeraCopy…” from the context menu. When you’ve selected which files to transfer and where to transfer them to, you can then select which action to take after the process is complete (e.g. shutdown machine or close window). Finally, you kick the process of by clicking the “Copy” or “Move” buttons. TeraCopy keeps a log of all actions taken in the drop down box at the bottom of the window.</p>
<p><b>2. <a href="http://www.steganos.com/us/products/for-free/locknote/overview/">Steganos LockNote</a></b></p>
<p>Steganos LockNote allows you to securely store confidential notes such as license keys, passwords, phone numbers, etc. It uses AES-256 encryption to store your text in a self-executable container that requires a password to open it.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/LockNote.png"><img class="aligncenter size-medium wp-image-10703" alt="LockNote" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/LockNote-300x209.png" width="300" height="209" /></a></p>
<p>Steganos LockNote comes as a standalone application which does not require installation. When you launch LockNote.exe you are presented with a text editor similar to notepad.exe. Type whatever text you wish to be kept secret and go to File &gt; Save As… to save the note as an encrypted container. You will be prompted for a password and the resulting output file will be in *.exe format.</p>
<p><b>3. <a href="http://www.digitalvolcano.co.uk/duplicatecleaner.html">Duplicate Cleaner</a></b></p>
<p>Duplicate Cleaner is a file de-duplication tool that removes redundant copies of files from a specified hard drive or network location. It works by generating an MD5 hash of each file and then comparing hashes for duplicates. It also gives you the option to search for files using a byte-to-byte comparison. Once the duplicate files have been found, you can choose to delete them or move them to an archive location.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/DuplicateCleaner.png"><img class="aligncenter size-medium wp-image-10704" alt="DuplicateCleaner" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/DuplicateCleaner-300x169.png" width="300" height="169" /></a></p>
<p>When you launch Duplicate Cleaner, you first specify the search criteria from the first available tab, then you tell it where to look from the “Scan Location” tab before hitting “Scan Now”. A summary window will appear showing how many files were scanned and how many duplicates were found. The “Duplicate Files” tab highlights which files need attention.</p>
<p><b>4. <a href="http://www.bulkrenameutility.co.uk/">Bulk Rename Utility</a></b></p>
<p>Bulk Rename Utility is a lightweight yet powerful application for renaming files and folders using an extensive array of criteria. Using this tool you can remove, add or change text and numbers within the file name, add date/time stamps, change case, modify file and folder attributes and preview what the changes will look like before you go ahead with them. The Bulk Rename Utility also supports regular expressions for additional flexibility.</p>
<p><b>Note: </b>The Bulk Rename Utility comes in a command line version too. Using the command line version of the utility you can create scheduled jobs to perform a repetitive action at a specified time (e.g. rename a set of log files or backup files every day at midnight).</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/BulkRenameUtility.png"><img class="aligncenter size-medium wp-image-10705" alt="BulkRenameUtility" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/BulkRenameUtility-300x198.png" width="300" height="198" /></a></p>
<p>When you launch the Bulk Rename Utility you are presented with the navigation pane on the left hand side, the preview pane on the right hand side and a multitude of rename options at the bottom. Start by navigating to a folder that contains the files you wish to rename from the navigation pane or find the folder in Windows Explorer, right click on it and choose “Bulk Rename Here”.</p>
<p><b>5. <a href="http://www.freeopener.com/">Free Opener</a></b></p>
<p>Free Opener allows you to open over 80 different file formats from a single interface. Even if you don’t have the native application installed, you can quickly fire up Free Opener to open that file format. Free Opener supports Microsoft Office files, Archive files, Image files, Code files, Video files and Audio files, amongst others. Essentially it is just like having a Document Viewer, Image Viewer, Media Player and Archive Viewer all rolled into one!</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/FreeOpener.png"><img class="aligncenter size-medium wp-image-10706" alt="FreeOpener" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/FreeOpener-300x237.png" width="300" height="237" /></a></p>
<p>When you launch Free Opener, the first thing you should do is go to File &gt; File Associations to enable which file types you want to be associated with the Free Opener application. This will mean that any file that you double click to open will be opened automatically in Free Opener (if the file type is supported). Alternatively, click on the “Open” icon or go to File &gt; Open to choose a file to open in Free Opener. When you open a file, at the bottom of the window a menu bar will appear containing some edit options (which change depending on the file type you have opened).</p>
<p><b>6. <a href="http://sourceforge.net/projects/freefilesync/">FreeFileSync</a></b></p>
<p>FreeFileSync is a folder comparison and synchronization tool designed with usability and performance in mind. FreeFileSync allows you to save the configuration as a “.batch” file which you can then use to schedule a task for automatic folder synchronization.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/FreeFileSync1.png"><img class="aligncenter size-medium wp-image-10708" alt="FreeFileSync" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/FreeFileSync1-300x202.png" width="300" height="202" /></a></p>
<p>When you launch FreeFileSync, add a path to the left and right hand side of the window and hit the “Compare” button to compare both locations side-by-side. FreeFileSync will use a series of icons to highlight what’s different between both folders. You can then hit the “Synchronize” button to sync both folders. Go to Program &gt; Save as batch job… to save the configuration as a batch job for use later when scheduling a task.</p>
<p><b>7. <a href="http://peazip.sourceforge.net/">PeaZip</a></b></p>
<p>PeaZip is a cross-platform file and archive manager that supports volume spanning, high levels of compression and encryption, and support for a wide range of archiving formats. Using PeaZip you can create archive formats such as 7Z, ARC, BZ2, GZ, PAQ, PEA, QUAD/BALZ, TAR, UPX, WIM, XZ, and ZIP, and extract over 150 archive formats, including ACE, CAB, ISO, RAR, UDF, ZIPX and many more. PeaZip features include creating, converting and extracting multiple archives at once, creating self-extracting archives, secure data deletion, checksum creation and hashing.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/PeaZip.png"><img class="aligncenter size-medium wp-image-10709" alt="PeaZip" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/PeaZip-300x191.png" width="300" height="191" /></a></p>
<p>Once PeaZip is installed, you can either open or create an archive using the “Open as archive” or “Add to archive” context menu options respectively, or launch the application and take the required action from there. Once in the PeaZip UI, simply navigate to the required file or folder from the left hand pane and then click one of the icons in the top menu to take an action.</p>
<p><b>8. <a href="http://sourceforge.net/projects/winmerge/?source=directory">WinMerge</a></b></p>
<p>WinMerge is a file comparison and merging tool that visually displays the differences side-by-side. This tool is useful for helping to determine what has changed between two files versions and then merging those changes. WinMerge supports Unicode and regular expressions and includes Visual SourceSafe and Windows Shell integration.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/WinMerge.png"><img class="aligncenter size-medium wp-image-10710" alt="WinMerge" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/WinMerge-300x182.png" width="300" height="182" /></a></p>
<p>When you launch WinMerge and choose to open files to compare, you are asked to select a file for the left hand side and a file for the right hand side. Differences between these files are shown in the Location Pane and highlighted throughout both documents.</p>
<p><b>9. <a href="http://www.nirsoft.net/utils/search_my_files.html">SearchMyFiles</a></b></p>
<p>SearchMyFiles aims to be an alternative to the Windows &#8220;Search For Files And Folders&#8221; process, allowing more flexible and accurate searches to be performed. You can search using wildcards, last modified/created/accessed time, file attributes, file content (text or binary search) and by file size. Search results can be saved as a text, html, csv or xml file. SearchMyFiles comes as a standalone portable application that doesn&#8217;t require installation &#8211; it can there be run straight off a USB drive.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/SearchMyFiles.png"><img class="aligncenter size-medium wp-image-10711" alt="SearchMyFiles" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/SearchMyFiles-300x215.png" width="300" height="215" /></a></p>
<p>Executing the SearchMyFiles.exe application brings up the Search Options window which allows you to specify where to search and the search criteria to use to bring back results. Simply choose the desired options and hit “Start Search” to have the application perform the search operation.</p>
<p><b>10 <a href="http://sourceforge.net/projects/axcrypt/">AxCrypt</a></b></p>
<p>AxCrypt is a file-level encryption tool that integrates with the Windows shell and allows you to right-click on a file to encrypt or decrypt it using AES-256 encryption. AxCrypt also offers the ability to create a self-extracting archive to securely transfer files to another location (with AxCrypt not being required for decryption on the other end).</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/AxCrypt.png"><img class="aligncenter size-medium wp-image-10712" alt="AxCrypt" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/AxCrypt-288x300.png" width="288" height="300" /></a></p>
<p>Once installed, everything happens from the context menu when you right click on a file. You are given the option to Encrypt or Decrypt the file, manage passphrases or permanently delete the file.</p>
<p><b>11. <a href="http://www.filesplitter.org/">File Splitter</a></b></p>
<p>File Splitter does what it says in the name. It is a super lightweight standalone application that splits files into multiple chunks and merges chunks back into a whole file.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/Splitter.png"><img class="aligncenter size-medium wp-image-10713" alt="Splitter" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/Splitter-300x224.png" width="300" height="224" /></a></p>
<p>When you launch File Splitter, use the “Split file” tab to specify the source file to split and the destination of the file chunks as well as the size of each chuck. Similarly, use the “Join files” tab to specify the chucks to merge into a whole file again and the destination of where you want the joined file to be placed.</p>
<p><b>12. <a href="http://www.digitalvolcano.co.uk/hash.html">Hash Tool</a></b></p>
<p>Hash Tool allows you to quickly and easily calculate the hash of multiple files to verify file integrity. The tool supports Unicode file names and MD5, SHA-1, SHA-256, SHA-384, SHA-512, CRC32 hash types.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/HashTool.png"><img class="aligncenter size-medium wp-image-10714" alt="HashTool" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/HashTool-300x202.png" width="300" height="202" /></a></p>
<p>Start by selecting the hash type from the drop down list and then selecting the files to hash from the “Select File(s)” button. Alternatively, drag and drop the files into the “Results” window for the hash to be automatically calculated. You can then save the results to a txt or csv file or copy them to the clipboard.</p>
<p><b>13. <a href="http://www.prestosoft.com/edp_examdiff.asp#download">ExamDiff</a></b></p>
<p>Similar to the functionality offered in WinMerge, ExamDiff offers a visual side-by-side comparison of two files, highlighting the differences in different colours and giving you the option to navigate through the changes in a number of ways (e.g. using a drop down list).  ExamDiff also comes with command line options allowing you to create a batch file to automate the process.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/ExamDiff.png"><img class="aligncenter size-medium wp-image-10715" alt="ExamDiff" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/ExamDiff-300x172.png" width="300" height="172" /></a></p>
<p>When you launch ExamDiff, you are presented with a dialog box asking you to specify the location of the two files to compare. Once you do this and hit “OK”, the application opens displaying a side-by-side comparison of the files and highlighting lines that have been added, deleted or changed in different colours.</p>
<p><b>14. <a href="http://www.7-zip.org/">7-Zip</a></b></p>
<p>7-Zip is a powerful file archiving utility with a high compression ratio that supports a multitude of compression formats, including 7z, GZIP, TAR, ZIP, CAB, MSI, etc. Features include the ability to create self-extracting archives, adjust the compression level and add password protection. 7-Zip&#8217;s power lies in its compression ratio; it claims to provide a ZIP format compression ratio that is 2-10% better than its competitors and a 7z format compression ratio that is 30-70% better than ZIP format.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/7-Zip.png"><img class="aligncenter size-medium wp-image-10716" alt="7-Zip" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/7-Zip-300x233.png" width="300" height="233" /></a></p>
<p>When you launch the application, navigate to the folder containing the files you wish to archive and hit the “Add” button to create an archive. Alternatively, you can create an archive directly from the context menu by right clicking on a file or folder.</p>
<p><b>15. <strong><a href="http://www.microsoft.com/downloads/en/details.aspx?FamilyID=c26efa36-98e0-4ee9-a7c5-98d0592d8c52">Microsoft SyncToy</a></strong></b></p>
<p>SyncToy is an application that can be used as a mini backup utility to synchronize files and folders between two locations. SyncToy allows you to ‘Synchronize’ FolderA with FolderB where the changes are replicated on both ends, ‘Echo’ FolderA to FolderB where the changes in FolderA are replicated to FolderB, and ‘Contribute’ FolderA to FolderB where the changes in FolderA (except deletions) are replicated to FolderB.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/SyncToy.png"><img class="aligncenter size-medium wp-image-10717" alt="SyncToy" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/SyncToy-300x244.png" width="300" height="244" /></a></p>
<p>When you launch SyncToy, the first thing you need to do is create a New Folder Pair, specifying the left and right folders you wish to synchronize. You can then choose the Synchronization action (i.e. Synchronize, Echo, and Contribute) and which options you wish to use before running the synchronization session.</p>
<p><b>16. <a href="http://fspro.net/my-lockbox/">My LockBox</a></b></p>
<p>My Lockbox is an easy to use application that allows you to hide, lock and password protect a Windows folder on a FAT, FAT32 or NTFS volume so that it&#8217;s only accessible to you.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/MyLockbox.png"><img class="aligncenter size-medium wp-image-10718" alt="MyLockbox" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/MyLockbox-300x149.png" width="300" height="149" /></a></p>
<p>When you launch My Lockbox and choose which folder to protect, it automatically disappears from view within Windows Explorer or from the command line. The only way to access the folder is to launch My Lockbox, enter the password and Unlock the folder.</p>
<p><b>17. <a href="http://www.advancedrenamer.com/download">Advanced Renamer Portable</a></b></p>
<p>Advanced Remaner Portable is a standalone lightweight and easy to use application that can be used to quickly add, remove, replace, or append file or folder names in bulk.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/AdvancedRenamerPortable.png"><img class="aligncenter size-medium wp-image-10719" alt="AdvancedRenamerPortable" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/AdvancedRenamerPortable-300x214.png" width="300" height="214" /></a></p>
<p>Select the “Rename Files” or “Rename Folders” tab to rename files or folders respectively. Add files or folders to the list and create a new method from the left hand pane – here you create the renaming rules you want to apply to the list of files or folders. When you’re ready, hit “START BATCH” to initiate the process.</p>
<p><b>18. <a href="http://locate32.cogit.net/">Locate32</a></b></p>
<p>Locate32 is a search utility that finds files or folders based on their names. Locate32 works by indexing file and folder names in a database and then using the database to quickly return results. Locate32 comes packaged with a command line version that can be used to update and access the databases without any user interaction.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/Locate32.png"><img class="aligncenter size-medium wp-image-10720" alt="Locate32" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/Locate32-300x202.png" width="300" height="202" /></a></p>
<p>When you first launch Locate32, go Tools &gt; Settings &gt; Databases tab to set up your databases. Databases are essentially index locations – any files contained within a location specified in the database will be searchable more quickly. Once you’ve set your databases, use the “Name &amp; Location”, “Size and Date” and “Advanced” tabs to perform your search.</p>
<p><b>19. <a href="http://legroom.net/software/uniextract">Universal Extractor</a>         </b></p>
<p>Universal Extractor is designed to decompress and extract files from virtually any type of archive, regardless of source, file format or compression method. It supports anything from EXE format to ZIP, CAB, ACE, TAR.GZ, ISO, MSI, RAR, PEA and RPM format, amongst many others. It is handy because it saves you from needing different applications to open different archive formats.</p>
<p><b>Note:</b> Universal Extractor does not create archives; it is used only to extract data.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/UniversalExtractor.png"><img class="aligncenter size-medium wp-image-10721" alt="UniversalExtractor" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/UniversalExtractor-300x156.png" width="300" height="156" /></a></p>
<p>Once you open Universal Extractor, specify the location of the archive file and a destination folder where the contents will be extracted to. Press “OK” to start the extraction process. Once installed, Universal Extractor will also be available via the context menu, allowing you to easily right click on an archive and select “UnExtract”.</p>
<p><strong>20. </strong><b><a href="http://better-explorer.com/">Better Explorer</a></b></p>
<p>Better Explorer aims to be a replacement for Windows Explorer. It offers greater functionality and a streamlined UI with Ribbons (much like Microsoft Office) and Tabs. It includes the ability to manage favourites, conditional select, sizing charts (giving a visual representation of the size of a folder), in-built image editing tools, an enhanced search feature, and archive support.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/BetterExplorer.png"><img class="aligncenter size-medium wp-image-10722" alt="BetterExplorer" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/BetterExplorer-300x213.png" width="300" height="213" /></a></p>
<p><b>Note:</b> At the time of writing, this application is still in BETA. It is not recommended that this be installed on a production machine but rather that you use it in a testing environment or on a personal machine at home to try it out before the full version is launched. It made this list because of its potential; if the BETA is anything to go by, Better Explorer certainly looks like one to watch!<strong></strong></p>
<p>Are there any free tools not on this list that you’ve found useful and would like to share with the community? Then leave us a comment below and let us know!</p>
<p><strong><em>Like our posts? Subscribe to our <a href="http://feeds.feedburner.com/TalkTechToMe-All">RSS feed</a> or email feed (on the right hand side) now, and be the first to get them!</em></strong></p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/the-top-20-free-file-management-tools-for-sys-admins/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
		<item>
		<title>The Top 20 Free Network Monitoring and Analysis Tools for Sys Admins</title>
		<link>http://www.gfi.com/blog/the-top-20-free-network-monitoring-and-analysis-tools-for-sys-admins/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-top-20-free-network-monitoring-and-analysis-tools-for-sys-admins</link>
		<comments>http://www.gfi.com/blog/the-top-20-free-network-monitoring-and-analysis-tools-for-sys-admins/#comments</comments>
		<pubDate>Tue, 23 Jul 2013 14:39:55 +0000</pubDate>
		<dc:creator>Andrew Zammit Tabona</dc:creator>
				<category><![CDATA[Tech Zone]]></category>
		<category><![CDATA[TTTM]]></category>
		<category><![CDATA[Angry IP Scanner]]></category>
		<category><![CDATA[BandwidthD]]></category>
		<category><![CDATA[Capsa Free]]></category>
		<category><![CDATA[EasyNetMonitor]]></category>
		<category><![CDATA[Fiddler]]></category>
		<category><![CDATA[free tools]]></category>
		<category><![CDATA[Microsoft Network Monitor]]></category>
		<category><![CDATA[Nagios]]></category>
		<category><![CDATA[Network Analysis Tools]]></category>
		<category><![CDATA[network monitoring]]></category>
		<category><![CDATA[NetworkMiner]]></category>
		<category><![CDATA[NetXMS]]></category>
		<category><![CDATA[ntopng]]></category>
		<category><![CDATA[Pandora FMS]]></category>
		<category><![CDATA[PRTG Network Monitor Freeware]]></category>
		<category><![CDATA[Splunk]]></category>
		<category><![CDATA[SysAdmin]]></category>
		<category><![CDATA[The Dude]]></category>
		<category><![CDATA[Total Network Monitor]]></category>
		<category><![CDATA[Wireless Network Watcher]]></category>
		<category><![CDATA[WirelessNetView]]></category>
		<category><![CDATA[Xirrus Wi-Fi Inspector]]></category>
		<category><![CDATA[Xymon]]></category>
		<category><![CDATA[Zenoss Core]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=10677</guid>
		<description><![CDATA[We know how administrators love free tools that make their life easier and, to supplement the list provided on 101 Free Admin Tools, here are 20 of the best free tools for monitoring devices, services, ports or protocols and analysing &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/FBSysAdminWeekday2-3.jpg"><img class="wp-image-10700 alignright" style="margin: 10px; border: 0px solid black;" alt="FBSysAdminWeekday2 (3)" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/FBSysAdminWeekday2-3-300x300.jpg" width="192" height="192" /></a>We know how administrators love free tools that make their life easier and, to supplement the list provided on <b><a href="http://www.gfi.com/blog/101-free-admin-tools/">101 Free Admin Tools</a>, </b>here are 20 of the best free tools for monitoring devices, services, ports or protocols and analysing traffic on your network. Even if you may have heard of some of these tools before, we’re sure you’ll find a gem or two amongst this list – and if you know of any others, leave us a comment below!<span id="more-10677"></span><b></b></p>
<h2>1. <a href="http://www.microsoft.com/en-us/download/details.aspx?id=4865">Microsoft Network Monitor</a></h2>
<p>Microsoft Network Monitor is a packet analyser that allows you to capture, view and analyse network traffic. This tool is handy for troubleshooting network problems and applications on the network. Main features include support for over 300 public and Microsoft proprietary protocols, simultaneous capture sessions, a Wireless Monitor Mode and sniffing of promiscuous mode traffic, amongst others.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/MicrosoftNetworkMonitor.png"><img class="aligncenter size-medium wp-image-10678" alt="MicrosoftNetworkMonitor" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/MicrosoftNetworkMonitor-300x141.png" width="300" height="141" /></a></p>
<p>When you launch Microsoft Network Monitor, choose which adapter to bind to from the main window and then click “New Capture” to initiate a new capture tab. Within the Capture tab, click “Capture Settings” to change filter options, adapter options, or global settings accordingly and then hit “Start” to initiate the packet capture process.</p>
<h2>2. <a href="http://www.nagios.org/download">Nagios</a></h2>
<p>Nagios is a powerful network monitoring tool that helps you to ensure that your critical systems, applications and services are always up and running. It provides features such as alerting, event handling and reporting. The Nagios Core is the heart of the application that contains the core monitoring engine and a basic web UI. On top of the Nagios Core, you are able to implement plugins that will allow you to monitor services, applications, and metrics, a chosen frontend as well as add-ons for data visualisation, graphs, load distribution, and MySQL database support, amongst others.</p>
<p><b>Tip:</b> If you want to try out Nagios without needing to install and configure it from scratch, download Nagios XI and enable the free version. Nagios XI is the pre-configured enterprise class version built upon Nagios Core and is backed by a commercial company that offers support and additional features such as more plugins and advanced reporting.</p>
<p><b>Note:</b> The free version of Nagios XI is ideal for smaller environments and will monitor up to seven nodes.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/NagiosXI.png"><img class="aligncenter size-medium wp-image-10679" alt="NagiosXI" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/NagiosXI-300x274.png" width="300" height="274" /></a></p>
<p>Once you’ve installed and configured Nagios, launch the Web UI and begin to configure host groups and service groups. Once Nagios has had some time to monitor the status of the specified hosts and services, it can start to paint a picture of what the health of your systems look like.</p>
<h2>3. <a href="http://sourceforge.net/projects/bandwidthd/">BandwidthD</a></h2>
<p>BandwidthD monitors TCP/IP network usage and displays the data it has gathered in the form of graphs and tables over different time periods. Each protocol (HTTP, UDP, ICMP, etc) is color-coded for easier reading. BandwidthD runs discretely as a background service.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/bandwidthD.png"><img class="aligncenter size-medium wp-image-10680" alt="bandwidthD" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/bandwidthD-300x280.png" width="300" height="280" /></a></p>
<p>Installation is easy. Download and install Winpcap version 3.0 or above (you’ll already have this installed if you have Wireshark on the same box), unzip BandwidthD to a specified folder, edit the ../etc/bandwidthd.conf file accordingly, double click on the &#8220;Install Service&#8221; batch file and then start the BandwidthD services from the services.msc console. Once the service is running, give it some time to monitor network traffic and load the index.html page to start viewing bandwidth statistics.</p>
<h2>4. <a href="http://nicekit.com/net-monitor/best-free-net-monitor.htm">EasyNetMonitor</a></h2>
<p>EasyNetMonitor is a super lightweight tool for monitoring local and remote hosts to determine if they are alive or not. It is useful for monitoring critical servers from your desktop, allowing you to get immediate notification (via a balloon popup and/or log file) if a host does not respond to a periodic ping.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/EasyNetMonitor1.png"><img class="aligncenter size-full wp-image-10682" alt="EasyNetMonitor" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/EasyNetMonitor1.png" width="282" height="254" /></a></p>
<p>Once you launch EasyNetMonitor, it will appear as an icon in the notification area on your desktop where the IP addresses / host names of the machines you want to monitor can be added. Once you’ve added the machines you wish to monitor, be sure to configure the ping delay time and notification setting.</p>
<h2>5. <a href="http://www.colasoft.com/capsa-free">Capsa Free</a></h2>
<p>Capsa Free is a network analyzer that allows you to monitor network traffic, troubleshoot network issues and analyze packets. Features include support for over 300 network protocols (including the ability to create and customize protocols), MSN and Yahoo Messenger filters, email monitor and auto-save, and customizable reports and dashboards.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/Capsa.png"><img class="aligncenter size-medium wp-image-10683" alt="Capsa" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/Capsa-300x197.png" width="300" height="197" /></a></p>
<p>When you launch Capsa, choose the adapter you want it to bind to and click “Start” to initiate the capture process. Use the tabs in the main window to view the dashboard, a summary of the traffic statistics, the TCP/UDP conversations, as well as packet analysis.</p>
<h2>6. <a href="http://fiddler2.com/home">Fiddler</a></h2>
<p>Fiddler is a web debugging tool that captures HTTP traffic between chosen computers and the Internet. It allows you to analyze incoming and outgoing data to monitor and modify requests and responses before they hit the browser. Fiddler gives you extremely detailed information about HTTP traffic and can be used for testing the performance of your websites or security testing of your web applications (e.g. Fiddler can decrypt HTTPS traffic).</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/Fiddler.png"><img class="aligncenter size-medium wp-image-10684" alt="Fiddler" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/Fiddler-300x169.png" width="300" height="169" /></a></p>
<p>When you launch Fiddler, HTTP traffic will start to be captured automatically. To toggle traffic capturing, hit F12. You can choose which processes you wish to capture HTTP traffic for by clicking on “All Processes” in the bottom status bar, or by dragging the “Any Process” icon from the top menu bar onto an open application.</p>
<h2>7. <a href="http://sourceforge.net/projects/networkminer/">NetworkMiner</a></h2>
<p>NetworkMiner captures network packets and then parses the data to extract files and images, helping you to reconstruct events that a user has taken on the network &#8211; it can also do this by parsing a pre-captured PCAP file. You can enter keywords which will be highlighted as network packets are being captured. NetworkMiner is classed as a Network Forensic Analysis Tool (NFAT) that can obtain information such as hostname, operating system and open ports from hosts.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/NetworkMiner.png"><img class="aligncenter size-medium wp-image-10685" alt="NetworkMiner" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/NetworkMiner-300x153.png" width="300" height="153" /></a></p>
<p>In the example above, I set NetworkMiner to capture packets, opened a web browser and searched for “soccer” as a keyword on Google Images. The images displayed in the Images tab are what I saw during my browser session.</p>
<p>When you load NetworkMiner, choose a network adapter to bind to and hit the “Start” button to initiate the packet capture process.</p>
<h2>8. <a href="http://sourceforge.net/projects/pandora/?source=directory">Pandora FMS</a></h2>
<p>Pandora FMS is a performance monitoring, network monitoring and availability management tool that keeps an eye on servers, applications and communications. It has an advanced event correlation system that allows you to create alerts based on events from different sources and notify administrators before an issue escalates.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/pandorafms.png"><img class="aligncenter size-medium wp-image-10686" alt="pandorafms" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/pandorafms-300x226.png" width="300" height="226" /></a></p>
<p>When you login to the Pandora FMS Web UI, start by going to the ‘Agent detail’ and ‘Services’ node from the left hand navigation pane. From here, you can configure monitoring agents and services.</p>
<h2>9. <a href="http://sourceforge.net/projects/zenoss/">Zenoss Core</a></h2>
<p>Zenoss Core is a powerful open source IT monitoring platform that monitors applications, servers, storage, networking and virtualization to provide availability and performance statistics. It also has a high performance event handling system and an advanced notification system.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/ZenossCore.png"><img class="aligncenter size-medium wp-image-10687" alt="ZenossCore" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/ZenossCore-300x185.png" width="300" height="185" /></a></p>
<p>Once you login to Zenoss Core Web UI for the first time, you are presented with a two-step wizard that asks you to create user accounts and add your first few devices / hosts to monitor. You are then taken directly to the Dashboard tab. Use the Dashboard, Events, Infrastructure, Reports and Advanced tabs to configure Zenoss Core and review reports and events that need attention.</p>
<h2>10. <a href="http://www.paessler.com/prtg">PRTG Network Monitor Freeware</a></h2>
<p>PRTG Network Monitor monitors network availability and network usage using a variety of protocols including SNMP, Netflow and WMI. It is a powerful tool that offers an easy to use web-based interface and apps for iOS and Android. Amongst others, PRTG Network Monitor&#8217;s key features include:</p>
<p>(1) Comprehensive Network Monitoring which offers more than 170 sensor types for application monitoring, virtual server monitoring, SLA monitoring, QoS monitoring</p>
<p>(2) Flexible Alerting, including 9 different notification methods, status alerts, limit alerts, threshold alerts, conditional alerts, and alert scheduling</p>
<p>(3) In-Depth Reporting, including the ability to create reports in HTML/PDF format, scheduled reports, as well as pre-defined reports (e.g. Top 100 Ping Times) and report templates.</p>
<p><b>Note:</b> The Freeware version of PRTG Network Monitor is limited to 10 sensors.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/PRTGNetworkMonitor.png"><img class="aligncenter size-medium wp-image-10688" alt="PRTGNetworkMonitor" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/PRTGNetworkMonitor-300x262.png" width="300" height="262" /></a></p>
<p>When you launch PRTG Network Monitor, head straight to the configuration wizard to get started. This wizard will run you through the main configuration settings required to get the application up and running, including the adding of servers to monitors and which sensors to use.</p>
<h2>11. <a href="http://www.mikrotik.com/thedude">The Dude</a></h2>
<p>The Dude is a network monitoring tool that monitors devices and alerts you when there is a problem. It can also automatically scan all devices on a given subnet and then draw and layout a map of your network.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/TheDude.png"><img class="aligncenter size-medium wp-image-10689" alt="TheDude" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/TheDude-300x174.png" width="300" height="174" /></a></p>
<p>When you launch The Dude, you first choose to connect to a local or remote network and specify credentials accordingly. Click ‘Settings’ to configure options for SNMP, Polling, Syslog and Reports.</p>
<h2>12 <a href="http://www.splunk.com/download">Splunk</a></h2>
<p>Splunk is a data collection and analysis platform that allows you to monitor, gather and analyze data from different sources on your network (e.g. event logs, devices, services, TCP/UDP traffic, etc). You can set up alerts to notify you when something is wrong or use Splunk’s extensive search, reporting and dashboard features to make the most of the collected data. Splunk also allows you to install &#8216;Apps&#8217; to extend system functionality.</p>
<p><b>Note: </b>When you first download and install Splunk, it automatically installs the Enterprise version for you to trial for 60 days before switching to the Free version. To switch to the Free version straight away, go to Manager &gt; Licensing.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/Splunk.png"><img class="aligncenter size-medium wp-image-10690" alt="Splunk" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/Splunk-300x262.png" width="300" height="262" /></a></p>
<p>When you login to the Splunk web UI for the first time, add a data source and configure your indexes to get started. Once you do this you can then create reports, build dashboards, and search and analyze data.</p>
<h2>13. <a href="http://www.angryip.org/w/Download">Angry IP Scanner</a></h2>
<p>Angry IP Scanner is standalone application that facilitates IP address and port scanning. It is used to scan a range of IP addresses to find hosts that are alive and obtain information about them (including MAC address, open ports, hostname, ping time, NetBios information, etc).</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/AngryIpScanner.png"><img class="aligncenter size-medium wp-image-10691" alt="AngryIpScanner" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/AngryIpScanner-300x179.png" width="300" height="179" /></a></p>
<p>When you execute the application, go to Tools &gt; Preferences to configure Scanning and Port options, then go to Tools &gt; Fetchers to choose what information to gather from each scanned IP address.</p>
<h2>14 <a href="http://www.ntop.org/ntop/ntop-is-back-ntopng-1-0-just-released/">ntopng</a></h2>
<p>ntopng (‘ng’ meaning ‘next generation’) is the latest version of the popular network traffic analyzer called ntop. ntopng will sit in the background and gather network traffic, then display network usage information and statistics within a Web UI.</p>
<p><b>Note:</b> Although originally aimed for use on Unix-based systems, there is a Windows version available for a small fee, or a demo version limited to 2000 packets. If you are comfortable running ntopng on a Unix-based box then you can get the full version for free.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/ntopng.png"><img class="aligncenter size-medium wp-image-10692" alt="ntopng" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/ntopng-300x282.png" width="300" height="282" /></a></p>
<p>The image above shows the ntopng dashboard after a few minutes of network traffic collection. In this example, I am using the Windows version. After installation, I simply executed the redis-server.exe file from ..\Program Files (x86)\Redis and fired up the Web UI (http://127.0.0.1:3000).</p>
<h2>15. <a href="http://www.softinventive.com/products/total-network-monitor/">Total Network Monitor</a></h2>
<p>Total Network Monitor continuously monitors hosts and services on the local network, notifying you of any issues that require attention via a detailed report of the problem. The result of each probe is classified using green, red, or black colors to quickly show whether the probe was successful, had a negative result or wasn’t able to complete.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/TotalNetworkMonitor.png"><img class="aligncenter size-medium wp-image-10693" alt="TotalNetworkMonitor" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/TotalNetworkMonitor-300x191.png" width="300" height="191" /></a></p>
<p>When you launch Total Network Monitor, go to Tools &gt; Scan Wizard to have the wizard scan a specified network range automatically and assign the discovered hosts to a group. Alternatively, create a new group manually to start adding devices/hosts individually.</p>
<h2>16. <a href="http://www.netxms.org/download/">NetXMS</a></h2>
<p>NetXMS is a multi-platform network management and monitoring system that offers event management, performance monitoring, alerting, reporting and graphing for the entire IT infrastructure model. NetXMS&#8217;s main features include support for multiple operating systems and database engines, distributed network monitoring, auto-discovery, and business impact analysis tools, amongst others. NetXMS gives you the option to run a web-based interface or a management console.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/NetXMS.png"><img class="aligncenter size-medium wp-image-10694" alt="NetXMS" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/NetXMS-300x185.png" width="300" height="185" /></a></p>
<p>Once you login to NetXMS you need to first go to the “Server Configuration” window to change a few settings that are dependent on your network requirements (e.g. changing the number of data collection handlers or enabling network discovery). You can then run the Network Discovery option for NetXMS to automatically discover devices on your network, or add new nodes by right clicking on “Infrastructure Services” and selecting Tools &gt; Create Node.</p>
<h2>17. <a href="http://sourceforge.net/projects/xymon/">Xymon</a></h2>
<p>Xymon is a web-based system &#8211; designed to run on Unix-based systems &#8211; that allows you to dive deep into the configuration, performance and real-time statistics of your networking environment. It offers monitoring capabilities with historical data, reporting and performance graphs.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/Xymon.png"><img class="aligncenter size-medium wp-image-10695" alt="Xymon" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/Xymon-300x206.png" width="300" height="206" /></a></p>
<p>Once you&#8217;ve installed Xymon, the first place you need to go is the hosts.cfg file to add the hosts that you are going to monitor. Here, you add information such as the host IP address, the network services to be monitored, what URLs to check, and so on.</p>
<p>When you launch the Xymon Web UI, the main page lists the systems and services being monitored by Xymon. Clicking on each system or service allows you to bring up status information about a particular host and then drill down to view specific information such as CPU utilization, memory consumption, RAID status, etc.</p>
<h2>18. <a href="http://www.nirsoft.net/utils/wireless_network_view.html">WirelessNetView</a></h2>
<p>WirelessNetView is a lightweight utility (available as a standalone executable or installation package) that monitors the activity of reachable wireless networks and displays information related to them, such as SSID, Signal Quality, MAC Address, Channel Number, Cipher Algorithm, etc.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/WirelessNetView.png"><img class="aligncenter size-medium wp-image-10696" alt="WirelessNetView" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/WirelessNetView-300x90.png" width="300" height="90" /></a></p>
<p>As soon as you execute WirelessNetView, it automatically populates a list of all reachable Wi-Fi networks in the area and displays information relevant to them (all columns are enabled by default).</p>
<p><b>Note: </b><a href="http://www.nirsoft.net/utils/wireless_network_watcher.html">Wireless Network Watcher</a> is a small utility that goes hand in hand with WirelessNetView. It scans your wireless network and displays a list of all computers and devices that are currently connected, showing information such as IP adddress, MAC address, computer name and NIC card manufacturer – all of which can be exported to a html/xml/csv/txt file.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/WirelessNetworkWatcher.png"><img class="aligncenter size-medium wp-image-10697" alt="WirelessNetworkWatcher" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/WirelessNetworkWatcher-300x134.png" width="300" height="134" /></a></p>
<h2>19. <a href="http://www.xirrus.com/Products/Wi-Fi-Inspector">Xirrus Wi-Fi Inspector</a></h2>
<p>Xirrus Wi-Fi Inspector can be used to search for Wi-Fi networks, manage and troubleshoot connections, verify Wi-Fi coverage, locate Wi-Fi devices and detect rogue Access Points. Xirrus Wi-Fi Inspector comes with built-in connection, quality and speed tests.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/XirrusWiFiInspector.png"><img class="aligncenter size-medium wp-image-10698" alt="XirrusWiFiInspector" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/XirrusWiFiInspector-300x247.png" width="300" height="247" /></a></p>
<p>Once you launch Wi-Fi Inspector and choose an adapter, a list of available Wi-Fi connections is displayed in the “Networks” pane. Details related to your current Wi-Fi connection are displayed in the top right hand corner. Everything pretty much happens from the top ribbon bar – you can run a test, change the layout, edit settings, refresh connections, etc.</p>
<h2>20. <a href="http://www.wireshark.org/download.html">WireShark</a></h2>
<p>This list wouldn’t be complete without the ever popular WireShark. WireShark is an interactive network protocol analyzer and capture utility. It provides for in-depth inspection of hundreds of protocols and runs on multiple platforms.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/WireShark.png"><img class="aligncenter size-medium wp-image-10699" alt="WireShark" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/WireShark-300x182.png" width="300" height="182" /></a></p>
<p>When you launch Wireshark, choose which interface you want to bind to and click the green shark fin icon to get going. Packets will immediately start to be captured. Once you’ve collected what you need, you can export the data to a file for analysis in another application or use the in-built filter to drill down and analyze the captured packets at a deeper level from within Wireshark itself.</p>
<p>Are there any free tools not on this list that you’ve found useful and would like to share with the community? Then leave us a comment below and let us know!</p>
<p><strong><em>Like our posts? Subscribe to our <a href="http://feeds.feedburner.com/TalkTechToMe-All">RSS feed</a> or email feed (on the right hand side) now, and be the first to get them!</em></strong></p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/the-top-20-free-network-monitoring-and-analysis-tools-for-sys-admins/feed/</wfw:commentRss>
		<slash:comments>3</slash:comments>
		</item>
		<item>
		<title>Top 5 Free Rescue Discs for Your Sys Admin Toolkit</title>
		<link>http://www.gfi.com/blog/top-5-free-rescue-discs-for-your-sys-admin-toolkit/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=top-5-free-rescue-discs-for-your-sys-admin-toolkit</link>
		<comments>http://www.gfi.com/blog/top-5-free-rescue-discs-for-your-sys-admin-toolkit/#comments</comments>
		<pubDate>Fri, 12 Jul 2013 15:00:08 +0000</pubDate>
		<dc:creator>Andrew Zammit Tabona</dc:creator>
				<category><![CDATA[Tech Zone]]></category>
		<category><![CDATA[TTTM]]></category>
		<category><![CDATA[AVG Rescue CD]]></category>
		<category><![CDATA[Avira AntiVir Rescue System]]></category>
		<category><![CDATA[Boot-Repair-Disk]]></category>
		<category><![CDATA[F-Secure Rescue CD]]></category>
		<category><![CDATA[FalconFour’s Ultimate Boot CD]]></category>
		<category><![CDATA[Hiren Boot CD]]></category>
		<category><![CDATA[Knoppix]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[Linux distribution]]></category>
		<category><![CDATA[Live USB]]></category>
		<category><![CDATA[Master Boot Record]]></category>
		<category><![CDATA[MiniXP]]></category>
		<category><![CDATA[Parted Magic]]></category>
		<category><![CDATA[PuppyLinux]]></category>
		<category><![CDATA[repair tools]]></category>
		<category><![CDATA[Rescue CDs]]></category>
		<category><![CDATA[Rescue Disc]]></category>
		<category><![CDATA[SystemRescueCD]]></category>
		<category><![CDATA[Trinity Rescue Kit]]></category>
		<category><![CDATA[troubleshoot]]></category>
		<category><![CDATA[Ubuntu LiveCD]]></category>
		<category><![CDATA[Ultimate Boot CD]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[Windows System Repair Disc]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=10653</guid>
		<description><![CDATA[A Rescue Disc can be a life saver for a Sys Admin. Packed with various diagnostic and repair tools they can do things like fix a Master Boot Record (MBR), recover a password, detect and clean a rootkit or simply &#8230;]]></description>
				<content:encoded><![CDATA[<p>A Rescue Disc can be a life saver for a Sys Admin. Packed with various diagnostic and repair tools they can do things like fix a Master Boot Record (MBR), recover a password, detect and clean a rootkit or simply allow you to salvage data by transferring it from a damaged drive to another location. Here are the best all-in-one Bootable CD/USBs that admins can use to troubleshoot and repair a Linux or Windows system – all handy additions to your toolkit.</p>
<p><b>1. <a href="http://www.hirensbootcd.org/download/">Hiren Boot CD</a></b><i></i></p>
<p>The tagline for Hiren Boot CD reads “a first aid kit for your computer” &#8211; and that it is! Hiren Boot CD is one of the more popular Rescue CDs out there and contains a wealth of tools including defrag tools, driver tools, backup tools, anti-virus and anti-malware tools, rootkit detection tools, secure data wiping tools, and partitioning tools, amongst others.</p>
<p>Hiren Boot CD is available to download as an ISO for easy installation to a USB or burning to a CD.</p>
<p>The boot menu allows you to boot into the MiniXP environment, the Linux-based rescue environment, run a series of tools or boot directly from a specified partition.</p>
<p style="text-align: center;"><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/Hiren_PreBoot.png"><img class="aligncenter  wp-image-10654" alt="Hiren_PreBoot" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/Hiren_PreBoot.png" width="464" height="243" /></a></p>
<p>The MiniXP environment, as shown in the image below, is much like a Windows XP desktop. Everything pretty much happens from the HBCD Launcher (a standalone application with a drop down menu containing shortcuts to the packaged applications).</p>
<p style="text-align: center;"><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/Hiren_MiniXPBooted.png"><img class="aligncenter  wp-image-10655" alt="Hiren_MiniXPBooted" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/Hiren_MiniXPBooted.png" width="432" height="325" /></a></p>
<p>&nbsp;</p>
<p><b>2. <a href="http://falconfour.wordpress.com/tag/f4ubcd/">FalconFour’s Ultimate Boot CD</a></b></p>
<p>FalconFour’s Ultimate Boot CD is based upon the Hiren Boot CD with a customized boot menu and a whole bunch of updated tools thrown in. F4’s UBCD contains tools that provide system information, tools that recover/repair broken partitions, tools that recover data, as well as file utilities, password recovery tools, network tools, malware removal tools and much more.</p>
<p>F4’s UBCD is available for download as an ISO file so you can burn it to a CD or use it to create a bootable USB drive.</p>
<p>Similar to Hiren Boot CD, when you boot F4’s UBCD you are presented with a menu giving you the option to boot into a Linux environment, the MiniXP environment or run a series of standalone tools. As you scroll through the menu, a description of each item is given at the bottom of the screen.</p>
<p style="text-align: center;"><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/F4UBCD1_PreBoot.png"><img class="aligncenter  wp-image-10656" alt="F4UBCD1_PreBoot" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/F4UBCD1_PreBoot.png" width="406" height="318" /></a></p>
<p>Similar to that of Hiren Boot CD, the MiniXP environment is much like a Windows XP desktop environment, only it’s really lightweight and is pre-packed with a host of diagnostic and repair tools.</p>
<p style="text-align: center;"><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/F4UBCD2_MiniXPBooted.png"><img class="aligncenter  wp-image-10657" alt="F4UBCD2_MiniXPBooted" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/F4UBCD2_MiniXPBooted.png" width="443" height="332" /></a></p>
<p>Once the desktop has loaded up, choose from one of the available application shortcuts, launch the HBCD Menu or go to the Start menu to get going.<i></i></p>
<p>&nbsp;</p>
<p><b>3. <a href="http://www.sysresccd.org/Download">SystemRescueCD</a> </b></p>
<p>SystemRescueCD is a Linux-based package for troubleshooting Linux and Windows systems. The disc contains antivirus, malware removal, and rootkit removal tools as well as tools to help manage or repair partitions, recover your data, back up your data or clone your drives. SystemRescueCD supports ext2/ext3/ext4, reiserfs, btrfs, xfs, jfs, vfat, and ntfs file systems, as well as network file systems like samba and nfs. It also comes with network troubleshooting, file editing, and bootloader restoration tools.</p>
<p>SystemRescueCD is available for download as an ISO file so you can burn it to a CD or use it to create a bootable USB drive.</p>
<p>When you boot the SystemRescueCD, the pre-boot menu gives you a multitude of options, allowing you to boot directly into the graphical environment or the command line.</p>
<p style="text-align: center;"><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/SystemRescueCD1_PreBoot1.png"><img class="aligncenter  wp-image-10659" alt="SystemRescueCD1_PreBoot" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/SystemRescueCD1_PreBoot1.png" width="383" height="287" /></a></p>
<p>In the image below, I have booted into the graphical environment and started the chkrootkit application from the Terminal window which searches for rootkits installed on the system. Other applications can be run directly from the terminal in a similar fashion, using arguments and parameters as necessary.</p>
<p style="text-align: center;"><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/SystemRescueCD1_xstart.png"><img class="aligncenter  wp-image-10660" alt="SystemRescueCD1_xstart" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/SystemRescueCD1_xstart.png" width="433" height="324" /></a></p>
<p>&nbsp;</p>
<p><b>4. <a href="http://www.ultimatebootcd.com/download.html">Ultimate Boot CD</a></b></p>
<p>Ultimate Boot CD is designed to help you troubleshoot Windows and Linux systems using a series of diagnostic and repair tools. It contains anything from data recovery and drive cloning tools to BIOS management, memory and CPU testing tools.</p>
<p>UBCD is downloadable in ISO format for easy installation to a USB or burning to a CD.</p>
<p><b>Note:</b> UBCD4Win (<a href="http://www.ubcd4win.com/">http://www.ubcd4win.com/</a>) is UBCD’s brother built specifically for Windows systems.</p>
<p>When you boot with UBCD you are presented with a DOS-based interface that you navigate depending on which system component you wish to troubleshoot.</p>
<p style="text-align: center;"><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/UBCD_PreBoot.png"><img class="aligncenter  wp-image-10661" alt="UBCD_PreBoot" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/UBCD_PreBoot.png" width="474" height="265" /></a></p>
<p>&nbsp;</p>
<p><b>5. <a href="http://trinityhome.org/Home/index.php?content=TRINITY_RESCUE_KIT_DOWNLOAD">Trinity Rescue Kit</a></b></p>
<p>The Trinity Rescue Kit is a Linux-based Rescue CD aimed specifically at recovery and repair of Windows or Linux machines. It contains a range of tools allowing you to run AV scans, reset lost Windows passwords, backup data, recover data, clone drives, modify partitions and run rootkit detection tools.</p>
<p>The Trinity Rescue Kit is downloadable in ISO format for easy installation to a USB or burning to a CD.</p>
<p>The boot menu gives you the option to start TRK is different modes (useful if you’re having trouble loading in default mode).</p>
<p style="text-align: center;"><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/Trinity_PreBoot.png"><img class="aligncenter  wp-image-10662" alt="Trinity_PreBoot" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/Trinity_PreBoot.png" width="361" height="295" /></a></p>
<p>Once you get to the Trinity Rescue Kit ‘easy menu’, simply navigate through the list to choose which tool to execute. You can also switch to the command line if you want more flexibility and feel comfortable with Linux-based commands.</p>
<p style="text-align: center;"><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/Trinity_EasyBootMenu.png"><img class="aligncenter  wp-image-10663" alt="Trinity_EasyBootMenu" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/Trinity_EasyBootMenu.png" width="435" height="309" /></a></p>
<p>&nbsp;</p>
<h2><b>You may also wish to consider…</b></h2>
<p><a href="http://sourceforge.net/projects/boot-repair-cd/"><b>Boot-Repair-Disk</b></a><b></b></p>
<p>Boot-Repair-Disk is a Rescue CD primarily designed for repairing Linux distributions but can also be used to fix some Windows systems. It automatically launches the Boot-Repair application (a one-click repair system) which is used to repair access to operating systems; providing GRUB reinstallation, MBR restoration, file system repair and UEFI, SecureBoot, RAID, LVM, and Wubi support.</p>
<p><a href="http://partedmagic.com/doku.php?id=downloads"><b>Parted Magic </b></a><br />
<b></b></p>
<p>Parted Magic is a Linux-based bootable disc whose main focus is helping to repair/diagnose drive specific issues. It contains a series of drive management tools such as GParted, GSmartControl, CloneZilla and ms-sys for creating/editing partitions, retrieving drive status information, cloning a drive or managing bootloaders.</p>
<p><a href="http://windows.microsoft.com/en-gb/windows7/create-a-system-repair-disc"><b>Windows System Repair Disc</b></a></p>
<p>The Windows System Repair Disc lets you boot into the Windows Recovery Environment, giving you the option to detect and fix startup and booting issues, restore to a workable restore point (if you had System Restore enabled), restore the entire machine from a backup image, conduct a memory diagnostics test and use the command line to run utilities like chkdsk.</p>
<p>Additionally, Linux distributions such as <a href="http://puppylinux.org/main/Overview%20and%20Getting%20Started.htm"><b>PuppyLinux</b></a>, <a href="https://help.ubuntu.com/community/LiveCD"><b>Ubuntu LiveCD</b></a> or <a href="http://knoppix.net/"><b>Knoppix</b></a> are lightweight bootable versions of Linux that contain a host of handy tools to fix common problems, recover data, transfer data, scan for viruses, manage partitions, etc.</p>
<p>Finally, you could also try a Rescue Disc from a popular Anti-Virus vendor , such as <a href="http://www.avg.com/gb-en/avg-rescue-cd"><b>AVG Rescue CD</b></a>, <a href="http://www.f-secure.com/en/web/labs_global/removal-tools/-/carousel/view/142"><b>F-Secure Rescue CD</b></a>, or <a href="http://www.avira.com/en/download/product/avira-antivir-rescue-system"><b>Avira AntiVir Rescue System</b></a>. Although primarily targeted to help with system’s that are infected with Malware, they are worth adding to your arsenal.</p>
<h2><b>Create your own!</b></h2>
<p>If you want more flexibility, why not create or customize your own bootable rescue disc?</p>
<p>You have a couple of options here:</p>
<p><b>1)      </b><b>Create your own bootable Live USB</b></p>
<p>Using applications such as YUMI (Your Universal Multiboot Installer) or UNetBootin, you can create a multi-boot USB drive containing several operating systems, antivirus utilities, disc cloning, diagnostic tools, and more.</p>
<p><b>2)      </b><b>Modify a Linux distribution</b></p>
<p>If you are using a Linux-based Rescue CD / Live CD, you can use an application like Live-Magic (for Debian-based Linux distributions) or Remastersys to create a bootable ISO of an already installed Linux OS. The idea would be to install a clean build of Linux, add or remove applications and make any customizations as necessary and then run the above mentioned applications to capture the build into an ISO.</p>
<p>Alternatively, instead of using an application, you can use a series of shell scripts to do the same thing. Check out <a href="http://www.linux-live.org/">http://www.linux-live.org/</a> for more information.</p>
<p>So which is your favourite? Have you come across any Rescue CDs not on this list that you’ve found useful and would like to share with the rest of the community?</p>
<p><strong><em>Like our posts? Subscribe to our <a href="http://feeds.feedburner.com/TalkTechToMe-All">RSS feed</a> or email feed (on the right hand side) now, and be the first to get them!</em></strong></p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/top-5-free-rescue-discs-for-your-sys-admin-toolkit/feed/</wfw:commentRss>
		<slash:comments>4</slash:comments>
		</item>
		<item>
		<title>Top 20 Free Disk Tools for SysAdmins</title>
		<link>http://www.gfi.com/blog/top-20-free-disk-tools-for-sysadmins/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=top-20-free-disk-tools-for-sysadmins</link>
		<comments>http://www.gfi.com/blog/top-20-free-disk-tools-for-sysadmins/#comments</comments>
		<pubDate>Wed, 12 Jun 2013 16:00:22 +0000</pubDate>
		<dc:creator>Andrew Zammit Tabona</dc:creator>
				<category><![CDATA[Tech Zone]]></category>
		<category><![CDATA[TTTM]]></category>
		<category><![CDATA[CloneZilla]]></category>
		<category><![CDATA[CrystalDiskInfo]]></category>
		<category><![CDATA[Darik’s Boot And Nuke]]></category>
		<category><![CDATA[DBAN]]></category>
		<category><![CDATA[Defraggler]]></category>
		<category><![CDATA[Disk2vhd]]></category>
		<category><![CDATA[DiskCryptor]]></category>
		<category><![CDATA[GParted]]></category>
		<category><![CDATA[HD Tune]]></category>
		<category><![CDATA[HDDScan]]></category>
		<category><![CDATA[MyDefrag]]></category>
		<category><![CDATA[NTFSWalker]]></category>
		<category><![CDATA[OSFMount]]></category>
		<category><![CDATA[Parted Magic]]></category>
		<category><![CDATA[Recuva]]></category>
		<category><![CDATA[SpeedFan]]></category>
		<category><![CDATA[SSDLife]]></category>
		<category><![CDATA[TestDisk]]></category>
		<category><![CDATA[TreeSize]]></category>
		<category><![CDATA[TrueCrypt]]></category>
		<category><![CDATA[WinDirStat]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=10560</guid>
		<description><![CDATA[Here are 20 of the best free tools for partitioning, cloning, diagnostics, repair, recovery, encryption, wiping or drive information. This list is intended to supplement the list provided on 101 Free SysAdmin Tools. Even if you may have heard of some &#8230;]]></description>
				<content:encoded><![CDATA[<p>Here are 20 of the best free tools for partitioning, cloning, diagnostics, repair, recovery, encryption, wiping or drive information. This list is intended to supplement the list provided on <a href="http://www.gfi.com/blog/101-free-admin-tools/"><i>101 Free SysAdmin Tools</i></a>. Even if you may have heard of some of these tools before, I’m confident that you’ll find a gem or two amongst this list.<span id="more-10560"></span></p>
<h2>1. TestDisk</h2>
<p><a href="http://www.cgsecurity.org/wiki/TestDisk">TestDisk</a> allows you to repair boot sectors, recover deleted partitions, fix damaged partition tables, and recover deleted data, as well as copy files from deleted/inaccessible partitions. It works on a number of different file systems including FAT/NTFS/exFAT/ext2.</p>
<p><b>Note:</b> Bundled with TestDisk is a companion application called PhotoRec. PhotoRec recovers photos, videos and documents from different storage media by going beyond the file system and looking for specific data blocks (i.e. clusters) belonging to the missing file(s).</p>
<p style="text-align: center;"><a href="http://www.gfi.com/blog/wp-content/uploads/2013/06/TestDisk.png"><img class="size-medium wp-image-10561 aligncenter" alt="TestDisk" src="http://www.gfi.com/blog/wp-content/uploads/2013/06/TestDisk-300x195.png" width="300" height="195" /></a></p>
<p>When you first run TestDisk you are asked to choose whether you want a log file to be created. You are then given a list of partition table types to choose from (this will allow the application to use the correct signature when reading the partitions on all available disks), before being presented with a list of available hard drive partitions to perform a selected action on. The choice of actions you can perform on each partition include:</p>
<p>(1)    analysing the partition for the correct structure (and repairing it accordingly if a problem is found)</p>
<p>(2)    changing the disk geometry</p>
<p>(3)    deleting all data in the partition table</p>
<p>(4)    recovering the boot sector</p>
<p>(5)    listing and copying files</p>
<p>(6)    recovering deleted files</p>
<p>(7)    creating an image of the partition</p>
<h2>2. Parted Magic</h2>
<p><a href="http://partedmagic.com/">Parted Magic</a> is a Linux-based bootable CD/USB that contains a series of HDD/SSD disk management tools such as GParted, GSmartControl, Disk Eraser and CloneZilla.<b><br />
</b></p>
<p style="text-align: center;"><a href="http://www.gfi.com/blog/wp-content/uploads/2013/06/PartedMagic.png"><img class="size-medium wp-image-10562 aligncenter" alt="PartedMagic" src="http://www.gfi.com/blog/wp-content/uploads/2013/06/PartedMagic-300x179.png" width="300" height="179" /></a></p>
<p>When you boot the machine using Parted Magic you are presented with a menu asking which GUI version you’d like to load (xvesa or xorg), as well as whether you want to load Parted Magic directly from RAM. Once Parted Magic has loaded, the UI is much like a Linux operating system – all you need to do is select which tool to run and go from there.</p>
<h2><b>3. WinDirStat</b></h2>
<p><b></b><a href="http://windirstat.info/">WinDirStat</a> is a disk usage and clean-up utility that allows you to visualize how data is distributed across a disk and what types of data or which locations are hogging up most space.</p>
<p style="text-align: center;"><a href="http://www.gfi.com/blog/wp-content/uploads/2013/06/WinDirStat.png"><img class="size-medium wp-image-10563 aligncenter" alt="WinDirStat" src="http://www.gfi.com/blog/wp-content/uploads/2013/06/WinDirStat-300x179.png" width="300" height="179" /></a></p>
<p style="text-align: left;">Once you’ve loaded WinDirStat and chosen which drives you’d like to analyse, you are presented with a tree view of the files and folders contained on each drive as well as a graphical representation showing which files are taking up most space. Clicking on a box within the graphic will display the file in question within the tree view on the left hand pane of the window.</p>
<h2 style="text-align: left;"><b>4. CloneZilla</b></h2>
<p style="text-align: left;"><b></b><a href="http://clonezilla.org/">CloneZilla</a> is a disk imaging and cloning tool that is also packaged with Parted Magic but originally available as a standalone tool in two versions; CloneZilla Live and CloneZilla SE (Server Edition). CloneZilla Live is a bootable Linux distribution that allows you to clone individual machines and CloneZilla SE is a package that you install and configure on a Linux distribution that allows you to push images to multiple clients simultaneously over the network.</p>
<p style="text-align: center;"><a href="http://www.gfi.com/blog/wp-content/uploads/2013/06/CloneZilla-Live.png"><img class="size-medium wp-image-10564 aligncenter" alt="CloneZilla-Live" src="http://www.gfi.com/blog/wp-content/uploads/2013/06/CloneZilla-Live-300x224.png" width="300" height="224" /></a></p>
<h2 style="text-align: left;"><b>5. OSFMount</b></h2>
<p style="text-align: left;"><b></b>Using this utility you can mount image files as drive letters and then browse the data directly. <a href="http://www.osforensics.com/tools/mount-disk-images.html">OSFMount</a> supports image files such as DD, ISO, BIN, as well as VMWare Images (*.VMDK) and Nero Burning ROM Images (*.NRG). A neat additional feature of OSFMount is its ability to create RAM disks, useful if you want additional security (since everything within RAM will be flushed when the machine is shutdown) or need to store data that requires fast access times (such as browser cache, database files, etc.).<b><br />
</b></p>
<p style="text-align: center;"><a href="http://www.gfi.com/blog/wp-content/uploads/2013/06/OSFMount.png"><img class="size-medium wp-image-10565 aligncenter" alt="OSFMount" src="http://www.gfi.com/blog/wp-content/uploads/2013/06/OSFMount-300x207.png" width="300" height="207" /></a></p>
<p>After you run OSFMount, go to File &gt; Mount new virtual disk… to get started. Remember to leave “Read-only drive” checked, otherwise you risk overwriting data within the image you’ve just mounted.</p>
<h2 style="text-align: left;"><b>6. Defraggler</b></h2>
<p style="text-align: left;"><b></b><a href="http://www.piriform.com/defraggler">Defraggler</a> is a lightweight yet powerful defragmentation tool that allows you to defrag whole drives or selected files/folders. It has an intuitive interface that helps you to quickly visualize how much of the drive is fragmented and which files are causing most fragmentation.</p>
<p style="text-align: center;"><a href="http://www.gfi.com/blog/wp-content/uploads/2013/06/Defraggler.png"><img class="size-medium wp-image-10566 aligncenter" alt="Defraggler" src="http://www.gfi.com/blog/wp-content/uploads/2013/06/Defraggler-300x258.png" width="300" height="258" /></a></p>
<p>Once you’ve performed an Analysis of the drive, you can use the Drive map to see which files are fragmented. Hover your mouse over a particular square on the map and click on it to display the files associated with that particular colour (e.g. fragmented, not fragmented, etc.).</p>
<h2 style="text-align: left;"><b>7. SSDLife</b></h2>
<p style="text-align: left;"><a href="http://ssd-life.com/eng/download-ssdlife.html">SSDLife</a> displays information about your SSD drive, its health status and estimated lifetime – all useful for helping you to plan ahead and take action accordingly.</p>
<p style="text-align: center;"><a href="http://www.gfi.com/blog/wp-content/uploads/2013/06/SSDLife.png"><img class="size-medium wp-image-10567 aligncenter" alt="SSDLife" src="http://www.gfi.com/blog/wp-content/uploads/2013/06/SSDLife-217x300.png" width="217" height="300" /></a></p>
<p>SSDLife automatically detects the model of your SSD drive and displays information about it instantly upon loading the application.</p>
<p><b>Tip: </b>Each SSD manufacturer should have their own SSD drive management software which gives information similar to SSDLife Free. For example, the “Intel SSD Toolbox” can be used with the SSD shown in the screenshot above to display health status, detailed device information, and estimated life remaining.</p>
<h2 style="text-align: left;"><b>8. Darik’s Boot And Nuke (DBAN)</b></h2>
<p style="text-align: left;"><b></b><a href="http://www.dban.org/">DBAN</a> is a bootable application that forensically wipes hard drives to prevent identity theft. This tool is useful when you are recycling or decommissioning a server/workstation.</p>
<p style="text-align: left;"><a href="http://www.gfi.com/blog/wp-content/uploads/2013/06/DBAN.png"><img class="aligncenter size-medium wp-image-10568" alt="DBAN" src="http://www.gfi.com/blog/wp-content/uploads/2013/06/DBAN-300x167.png" width="300" height="167" /></a></p>
<p>The two main options in DBAN are Interactive mode and Automatic mode. Interactive mode allows you to select which drives to wipe and which options to use when wiping them. Automatic mode will automatically wipe all discovered drives – no questions asked!</p>
<h2 style="text-align: left;"><b>9. HD Tune</b></h2>
<p style="text-align: left;"><b></b><a href="http://www.hdtune.com/index.html">HD Tune</a> can measure the read/write performance of your HDD/SSD, scan for errors, check the health status and display drive information.</p>
<p style="text-align: left;"><a href="http://www.gfi.com/blog/wp-content/uploads/2013/06/HDTune.png"><img class="aligncenter size-medium wp-image-10569" alt="HDTune" src="http://www.gfi.com/blog/wp-content/uploads/2013/06/HDTune-300x240.png" width="300" height="240" /></a></p>
<p>Once you start the application, select the drive from the drop down list and navigate to the appropriate tab to view the information you need or start a scan accordingly.</p>
<h2><b>10. TrueCrypt</b></h2>
<p><b></b><a href="http://www.truecrypt.org/">TrueCrypt</a> is an open-source encryption application that can encrypt entire drives/partitions. It can also create an encrypted volume that appears as a normal file but is only accessible when mounted via TrueCrypt using the provided password. TrueCrypt allows you to select from a list of encryption algorithms that all use a 256-bit key size.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/06/TrueCrypt.png"><img class="aligncenter size-medium wp-image-10570" alt="TrueCrypt" src="http://www.gfi.com/blog/wp-content/uploads/2013/06/TrueCrypt-300x255.png" width="300" height="255" /></a></p>
<p>When you open the TrueCrypt application, select a drive letter and click the “Create Volume” button to get started. This will launch the TrueCrypt Volume Creation Wizard which walks you through the process of encrypting a partition or creating an encrypted container file.</p>
<h2><b>11. CrystalDiskInfo</b></h2>
<p><b></b><a href="http://crystalmark.info/software/CrystalDiskInfo/index-e.html">CrystalDiskInfo</a> is a hard drive health monitoring tool that displays drive information, disk temperature and monitors S.M.A.R.T attributes. CrystalDiskInfo can be configured to trigger an alert (i.e. write to the event log, send an e-mail or make a sound) when a certain threshold is reached, so it can be left to actively monitor the HDD and notify you automatically.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/06/CrystalDiskInfo.png"><img class="aligncenter size-medium wp-image-10571" alt="CrystalDiskInfo" src="http://www.gfi.com/blog/wp-content/uploads/2013/06/CrystalDiskInfo-300x297.png" width="300" height="297" /></a></p>
<p>The bar at the top displays all active hard drives. Clicking on each one will display the information for that drive. The Health Status and Temperature icons change colour depending on their value.</p>
<h2><b>12. Recuva</b></h2>
<p><b></b>In a few simple clicks, <a href="http://www.piriform.com/recuva">Recuva</a> allows you to recover files from your computer that were accidentally deleted or that have become damaged or corrupt. The Quick-Start Wizard walks you through the recovery process by asking a couple of simple questions about what you want to recover and where you want to recover it from and then initiating a quick scan. You can skip the wizard and go straight to the application if you wish.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/06/Recuva.png"><img class="aligncenter size-medium wp-image-10572" alt="Recuva" src="http://www.gfi.com/blog/wp-content/uploads/2013/06/Recuva-300x260.png" width="300" height="260" /></a></p>
<p>From the Recuva interface, select the drive to scan from the drop down box on the left hand side, choose a pre-defined file type filter from the drop down box on the right hand side and then click “Scan” to get started. The filters can be edited to add or remove file types by extension. The Options button allows you to modify options such as enabling a Deep Scan (instead of a Quick Scan), changing the viewing mode, as well as increasing the secure overwriting method (how many times to overwrite a block of data).</p>
<h2><b>13. TreeSize</b></h2>
<p><b></b>An alternative to WinDirStat is a lightweight application called <a href="http://www.jam-software.com/treesize_free/screenshots.shtml">TreeSize</a>. TreeSize quickly scans drives or folders and displays the folder sizes in descending order (by default) to help you pinpoint which folders are taking up most space. The NTFS Compression flag can be enabled directly from within the application.</p>
<p>Once installed, TreeSize can also be started from the context menu by right clicking on a drive or folder and selecting “TreeSize Free” which will automatically open an instance of the application and display the details for that drive or folder.</p>
<p><b>Note: </b>When you have Defraggler, Recuva and TreeSize installed at the same time, you can initiate the Defraggler and Recuva features directly from within TreeSize for a given folder – all three applications integrate seamlessly.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/06/TreeSize.png"><img class="aligncenter size-medium wp-image-10573" alt="TreeSize" src="http://www.gfi.com/blog/wp-content/uploads/2013/06/TreeSize-300x228.png" width="300" height="228" /></a></p>
<p>Using the menu bar or the icons across the taskbar you can select options such as sorting by size or name, showing values in GB/MB/KB, displaying the percentage/file size/file count of the listed folders, and choosing which drives you wish to display details for.</p>
<h2><b>14. HDDScan</b></h2>
<p><b></b><a href="http://www.hddscan.com/">HDDScan</a> is a hard drive diagnostic utility used to test for disk errors, show S.M.A.R.T attributes, monitor disk temperature and perform a read/write benchmark.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/06/HDDSCan.png"><img class="aligncenter size-medium wp-image-10574" alt="HDDSCan" src="http://www.gfi.com/blog/wp-content/uploads/2013/06/HDDSCan-300x180.png" width="300" height="180" /></a></p>
<p>When you launch HDDScan, select the drive you wish to perform an action on from the drop down box on the left. Once selected, click the icon in the middle to get started.</p>
<h2><b>15. Disk2vhd</b></h2>
<p><b></b><a href="http://technet.microsoft.com/en-gb/sysinternals/ee656415">Disk2vhd</a> allows you to create a Virtual Hard Disk (VHD) of a live machine for use with Microsoft Virtual PC or Microsoft Hyper-V. This is a great tool for simulating your live environment within a virtual environment for testing purposes or if you wish to have a virtualized backup of your live environment for redundancy purposes.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/06/Disk2VHD.png"><img class="aligncenter size-medium wp-image-10575" alt="Disk2VHD" src="http://www.gfi.com/blog/wp-content/uploads/2013/06/Disk2VHD-300x237.png" width="300" height="237" /></a></p>
<p>Use of this tool is simple. Choose a name and location for the VHD file to be stored, select which volumes to include and click “Create”. Disk2vhd also has some command line options, allowing you to script the creation of VHD files.</p>
<h2><b>16. NTFSWalker</b></h2>
<p><b></b><a href="http://dmitrybrant.com/ntfswalker">NTFSWalker</a> allows you to perform a low-level analysis of all records (included deleted data) within the MFT table of an NTFS drive. You can examine the properties of each record and extract its contents out to a file.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/06/NTFSWalker.png"><img class="aligncenter size-medium wp-image-10576" alt="NTFSWalker" src="http://www.gfi.com/blog/wp-content/uploads/2013/06/NTFSWalker-300x189.png" width="300" height="189" /></a></p>
<p>When you load NTFSWalker, you are first asked to select a disk to scan. Once you select the disk and confirm which partition you wish to view, the MFT records are displayed on the left hand pane and the details are displayed on the right hand pane. From the right hand pane, you can view the record properties, preview the file or review the contents in raw format (Hex Data).</p>
<h2><b>17. GParted</b></h2>
<p><b></b><a href="http://gparted.sourceforge.net/">GParted</a> is an open-source application for managing partitions. Using GParted you can manipulate partitions (i.e. create, delete, resize, move, copy) and attempt to recover data from lost partitions on a vast amount of file systems.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/06/GParted.png"><img class="aligncenter size-medium wp-image-10577" alt="GParted" src="http://www.gfi.com/blog/wp-content/uploads/2013/06/GParted-300x224.png" width="300" height="224" /></a></p>
<p>GParted comes as a bootable CD which loads a Linux distribution containing the GParted application. When you download the ISO file you will need to burn the image onto a CD or follow the instructions to install it onto a bootable USB drive. When you launch GParted, you are presented with a list of partitions to choose from. Select the desired partition and choose an option to perform by right clicking on it, pressing an icon on the taskbar or navigating to an option on the menu bar.</p>
<h2><b>18. SpeedFan</b></h2>
<p><b></b><a href="http://www.almico.com/speedfan.php">SpeedFan</a> is a useful diagnostic utility that allows you to view details about the health of your machine, including hard disk temperatures and S.M.A.R.T (Self-Monitoring, Analysis and Reporting Technology) attributes.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/06/SpeedFan.png"><img class="aligncenter size-medium wp-image-10578" alt="SpeedFan" src="http://www.gfi.com/blog/wp-content/uploads/2013/06/SpeedFan-260x300.png" width="260" height="300" /></a></p>
<p>When you launch SpeedFan, the main tabs you will use for hard drive information are the Readings tab and the S.M.A.R.T tab. The Clocks tab can be used to compare temperature, voltage or fan speeds between two or more objects.</p>
<h2><b>19. MyDefrag</b></h2>
<p><b></b><a href="http://www.mydefrag.com/">MyDefrag</a> is a disk defragmentation and optimization utility that offers fast performance with little overhead and a number of actions tailored towards different disk uses (e.g. an action specifically for defragging the system disk, an action specifically for defragging flash memory drives, or the ability to only analyse the disk). MyDefrag also allows you to create or customize your own scripts and has a command line version so you can schedule the running of the application at given times.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/06/MyDefrag.png"><img class="aligncenter size-medium wp-image-10579" alt="MyDefrag" src="http://www.gfi.com/blog/wp-content/uploads/2013/06/MyDefrag-300x250.png" width="300" height="250" /></a></p>
<p>When you launch MyDefrag, you are presented with a series of scripts to choose from. Each script performs a given action against the disk(s) chosen from the bottom pane. Once you’ve selected a script and checked the desired disk(s), hit “Run” to initiate the action.</p>
<h2><b>20. DiskCryptor</b></h2>
<p><b></b>An alternative to TrueCrypt is <a href="http://diskcryptor.net/wiki/Main_Page/en">DiskCryptor</a>. DiskCryptor is an easy-to-use open-source application that allows you to encrypt whole partitions using the TwoFish / AES / Serpent algorithms, or a combination of any of the three. DiskCryptor supports FAT12, FAT16, FAT32, NTFS and exFAT file systems, allowing encryption of internal or external drives.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/06/DiskCryptor.png"><img class="aligncenter size-medium wp-image-10580" alt="DiskCryptor" src="http://www.gfi.com/blog/wp-content/uploads/2013/06/DiskCryptor-289x300.png" width="289" height="300" /></a></p>
<p>When you launch DiskCryptor, select a partition and click “Encrypt” to get started. You will then need to select which encryption algorithm to use and will be asked to enter a password. The encryption process will begin as soon as you press “OK”.</p>
<p>Any free tools you know of that are missing from this list? Leave us a comment!</p>
<p><strong><em>Like our posts? Subscribe to our <a href="http://feeds.feedburner.com/TalkTechToMe-All">RSS feed</a> or email feed (on the right hand side) now, and be the first to get them!</em></strong></p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/top-20-free-disk-tools-for-sysadmins/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
		<item>
		<title>Advanced Persistent Threat (APT) – A Hyped up Marketing Term or a Security Concern?</title>
		<link>http://www.gfi.com/blog/advanced-persistent-threat-apt-a-hyped-up-marketing-term-or-a-security-concern/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=advanced-persistent-threat-apt-a-hyped-up-marketing-term-or-a-security-concern</link>
		<comments>http://www.gfi.com/blog/advanced-persistent-threat-apt-a-hyped-up-marketing-term-or-a-security-concern/#comments</comments>
		<pubDate>Mon, 13 May 2013 14:00:55 +0000</pubDate>
		<dc:creator>Andrew Zammit Tabona</dc:creator>
				<category><![CDATA[Tech Zone]]></category>
		<category><![CDATA[TTTM]]></category>
		<category><![CDATA[Advanced Persistent Threat]]></category>
		<category><![CDATA[apt]]></category>
		<category><![CDATA[APT attack]]></category>
		<category><![CDATA[APT Examples]]></category>
		<category><![CDATA[APT Risk]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[cyber attacks]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[exploit vulnerability]]></category>
		<category><![CDATA[network access]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[threat]]></category>
		<category><![CDATA[vulnerability exploit]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=10520</guid>
		<description><![CDATA[It is not uncommon for marketing teams or advertising agencies to take a current IT ‘buzzword’ and use it as part of their campaign to promote a new product or service. Advanced Persistent Threat (APT) is one of those buzzwords. &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/05/Advanced-Persistent-Threat.jpg"><img class="alignright  wp-image-10521" style="border: 0px solid black; margin: 10px;" title="Advanced Persistent Threat" alt="Advanced Persistent Threat" src="http://www.gfi.com/blog/wp-content/uploads/2013/05/Advanced-Persistent-Threat-300x200.jpg" width="240" height="160" /></a>It is not uncommon for marketing teams or advertising agencies to take a current IT ‘buzzword’ and use it as part of their campaign to promote a new product or service. Advanced Persistent Threat (APT) is one of those buzzwords. Should we consider this term to be another form of scaremongering or is there a real threat behind it? This blog post will briefly outline what APT is and whether or not organizations should take what we are told by the advertising gurus with a pinch of salt.<span id="more-10520"></span><!--more--></p>
<p>It is thought that the term Advanced Persistent Threat (APT) was first coined by the US Air Force in 2006 to describe complex (i.e. Advanced) cyber-attacks against specific targets over a long period of time (i.e. Persistent).</p>
<p>An APT is a highly organized, well-funded attack against a specific target usually involving a large group of people working together and each bringing their own specialized skills to the table. The word ‘specific’ is important here because the people behind an APT have an intended purpose for wanting to target a particular entity. Using different methods (either internal or external), the attacker will relentlessly attempt to gain access to the network and stay there until they have achieved their objective.</p>
<p>The main targets of an APT attack are commonly those organizations with a large amount of sensitive information (e.g. source code, trade secrets, personally identifiable information (PII), etc.) that will usually help the attacker gain a competitive advantage, identify a weakness or somehow gain an upper hand over the victim of the attack. Such organizations include the following:</p>
<p>1)    Healthcare firms</p>
<p>2)    Universities</p>
<p>3)    Financial institutions</p>
<p>4)    Government entities.</p>
<h2>The APT Lifecycle</h2>
<p>Whilst each APT attack is tailored by the attacker depending on the intended target, the lifecycle of every APT attack typically consists of at least the following phases:</p>
<p>1)   <strong> Investigate</strong> – research the organization, its employees, its policies, the applications and systems it uses, and so on</p>
<p>2)    <strong>Infiltrate</strong> – exploit a vulnerability, use an insider, etc. to gain access to the network and escalate privileges</p>
<p>3)    <strong>Explore</strong> – once inside, collect information about the infrastructure, domain hierarchy, trust relationships, security structure, etc. that will allow you to exploit the system even further</p>
<p>4)    <strong>Retrieve</strong> – move across the network to harvest data from the organization over a sustained period of time</p>
<p>5)    <strong>Clean up</strong> – cover your tracks to ensure minimal attention and maintained presence within the network.</p>
<p>The attacker will normally use a variety of attack vectors as part of the APT lifecycle. The tools and techniques they use are those commonly associated with everyday cyber-attacks, such as social engineering (spear phishing or targeted phone calls), infected media, zero-day exploits, as well as a rogue employee or contractor inside the organization.</p>
<h2>APT Examples</h2>
<p>Probably one of the most widely publicized APTs was a highly sophisticated piece of malware called Stuxnet that was first discovered in June 2010 and has been intensely scrutinized by security researchers worldwide ever since. Stuxnet exploited four zero-day vulnerabilities and spread via USB devices. Its intention was to search for industrial control systems and siphon off source code and project data over time. With the majority of Stuxnet activity coming from Iran, it is believed that one of Iran’s nuclear power plants was the main target.</p>
<p>Other examples of APTs include:</p>
<p>(1) Operation Aurora in 2010 where a zero-day vulnerability in IE 6.0 was used in an attempt to steal intellectual property and gain access to user accounts in Google, Adobe, Symantec and many other high profile organizations.</p>
<p>(2) An attack on RSA in 2011 where the APT started from a spear phishing email that was sent to a small group of employees at the well-respected security firm. The email contained an Excel file with an attachment that installed a backdoor via an Adobe Flash vulnerability (which Adobe has since patched).</p>
<p>In all of these cases, it is clear that the attackers had substantial financial backing, did a fair amount of reconnaissance and had specific targets in mind.</p>
<h2>Reducing the APT Risk</h2>
<p>Assuming you have a sound information security strategy in place that caters for areas like IDS/IPS, strong passwords, user awareness and training, an email and social networking usage policy, change management process, end point security solutions, gateway and host-based AV, and incident response plans to name but a few, there are specific methods you can take to reduce the APT risk. These include:</p>
<p>1)    A Security Information Event Management (SIEM) system for the collection, review and notification of security alerts, as well as the collection and review of audit information pertinent to sensitive data access.</p>
<p>2)    Scanning for security vulnerabilities on a regular basis.</p>
<p>3)    Maintaining a solid patch management process.</p>
<p>4)    Implementing Data Leakage Prevention (DLP) technologies to:</p>
<ul>
<li>Increase traffic monitoring for malicious outbound activity such as requests to malicious websites, dynamic DNS servers and sensitive file transfer.</li>
<li>Scan outbound email and web traffic against a dynamic set of rules to prevent data leaving the organization.</li>
</ul>
<p>5)    Using behavioural threat analytics to flag subtle yet suspicious outbound traffic that might be indicative of APT activity. Such a system would take a baseline of typical activity and then look for anomalies that are not true to everyday “normal” behaviour (e.g. FTP traffic from a department that never uses FTP or network traffic being sent to servers in a country where the organization has absolutely no affiliation).</p>
<p>According to Gartner research, going forward, we will begin to see more content and context aware security solutions to help with the fight against the Advanced Persistent Threat. Such solutions will be able to make more accurate decisions, automatically fine-tune configurations, provide recommendations on what areas of the network should be given attention, as well as perform proactive checks against suspicious content before it becomes a threat.</p>
<h2>Conclusion</h2>
<p>Going back to the original question I asked at the beginning, should we be concerned? Yes! It is better to be cautious rather than be naive and think you are unlikely to be targeted. Although victims of an APT attack typically belong to a handful of industries, even if you are not the specific target, your organization might be one piece of the attacker’s puzzle because of information you have that is deemed valuable to them.</p>
<p>As we saw above, there is no such thing as an all-in-one solution to APT attacks. Because different attack vectors are used, a multi-layered approach to preventing (or at least minimizing the impact of an APT) is required. Marketing or advertising agencies that state APT is a big problem and action is needed are right, but I would question those that claim to be a one-stop shop for APT prevention.</p>
<p><strong><em>Like our posts? Subscribe to our <a href="http://feeds.feedburner.com/TalkTechToMe-All">RSS feed</a> or email feed (on the right hand side) now, and be the first to get them!</em></strong></p>
<p>&nbsp;</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/advanced-persistent-threat-apt-a-hyped-up-marketing-term-or-a-security-concern/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Windows PowerShell: Essential Admin Scripts (Part 2)</title>
		<link>http://www.gfi.com/blog/windows-powershell-essential-admin-scripts-part-2/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=windows-powershell-essential-admin-scripts-part-2</link>
		<comments>http://www.gfi.com/blog/windows-powershell-essential-admin-scripts-part-2/#comments</comments>
		<pubDate>Wed, 26 Dec 2012 13:03:52 +0000</pubDate>
		<dc:creator>Andrew Zammit Tabona</dc:creator>
				<category><![CDATA[Tech Zone]]></category>
		<category><![CDATA[TTTM]]></category>
		<category><![CDATA[ACL]]></category>
		<category><![CDATA[ACL permission checks]]></category>
		<category><![CDATA[check disk space]]></category>
		<category><![CDATA[delete data]]></category>
		<category><![CDATA[Disk Space Checker]]></category>
		<category><![CDATA[Microsoft Troubleshooting Packs]]></category>
		<category><![CDATA[notification email]]></category>
		<category><![CDATA[Ping and Notify]]></category>
		<category><![CDATA[PowerShell]]></category>
		<category><![CDATA[PowerShell scripting]]></category>
		<category><![CDATA[script]]></category>
		<category><![CDATA[SMTP]]></category>
		<category><![CDATA[Windows PowerShell]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=10074</guid>
		<description><![CDATA[In Part 1 of this two-part series, I covered the ‘Microsoft Troubleshooting Packs’ and ACL permission checks using PowerShell scripting. This article will focus on two more scripts, one to check if a host is alive and, if it is &#8230;]]></description>
				<content:encoded><![CDATA[<p>In <a href="http://www.gfi.com/blog/windows-powershell-essential-admin-scripts-part-1/">Part 1</a> of this two-part series, I covered the ‘Microsoft Troubleshooting Packs’ and ACL permission checks using PowerShell scripting. This article will focus on two more scripts, one to check if a host is alive and, if it is not, send a notification email, and another to check disk space, delete data from a given folder if a certain threshold is met and then notify a user by email.<span id="more-10074"></span><strong></strong></p>
<h2><strong>Ping and Notify</strong></h2>
<p>Of primary importance to any network admin is server availability. Being able to regularly monitor if a group of hosts are alive and then give you a ‘heads up’ when they aren’t is a useful tool to have. The idea behind this script is to use the ping command to verify the availability of a destination host(s) at specified intervals and take action based on the response that is received; if the response is positive then do nothing, if the response is negative, send a notification email.</p>
<p>To construct this script, we need the following main elements:</p>
<p>1)     The SMTP details for sending the email</p>
<p>2)     An Array to store the hosts to ping</p>
<p>3)     The Get-WmiObject cmdlet that uses the Win32_PingStatus class</p>
<p>4)     A ForEach loop to perform an operation on each element in the Array</p>
<p>5)     An If statement to perform a conditional action based on the result.</p>
<p>The first part of the script sets the email properties and stores each of them in a variable; $smtpServer holds the SMTP Server Name/IP Address, $smtpFrom stores the FROM address and $smtpTo stores the TO address.</p>
<p>An Array called $PingHosts is used to store the destination hosts to ping. The ForEach-Object cmdlet is used to execute the Get-WmiObject Win32_PingStatus command stored in $WmiPingStatus against the hosts stored in $PingHosts to the left of the pipe. The Select-Object cmdlet is used to obtain the Address and StatusCode property of each ping result.</p>
<p>A ForEach loop and If statement is then used to circle through each ping result and check if the status code is equal to 0. If it is equal to 0, no action is taken. If it is not equal to 0 then the email subject and body are set using the details of the non-responsive host and a message is sent using the Net.Mail.SmtpClient class. The image below shows a sample of the notification email that will be sent out to the address stored in $smtpTo.</p>
<p style="text-align: center;"><a href="http://www.gfi.com/blog/wp-content/uploads/2012/12/PingerNotifyEmail.png"><img class="size-medium wp-image-10075 aligncenter" title="PingerNotifyEmail" src="http://www.gfi.com/blog/wp-content/uploads/2012/12/PingerNotifyEmail-300x170.png" alt="" width="300" height="170" /></a></p>
<h3 style="text-align: left;"><strong>Script:</strong></h3>
<p style="padding-left: 30px;"># Set e-mail properties</p>
<p style="padding-left: 30px;">$smtpServer  = &#8220;192.168.0.5&#8243;;<br />
$smtpFrom = &#8220;pinger@yourdomain.com&#8221;;<br />
$smtpTo = &#8220;admin@domain.local&#8221;;</p>
<p style="padding-left: 30px;"># Create an Array to store the destination hosts to ping</p>
<p style="padding-left: 30px;">[Array] $PingHosts = &#8220;192.168.0.105&#8243;, &#8220;mailsrv01&#8243;, &#8220;www.google.com&#8221;</p>
<p style="padding-left: 30px;"># Run Get-WmiObject using the Win32_PingStatus class against every host in the Array<br />
$WmiPingStatus = {Get-WmiObject -Class Win32_PingStatus -Filter (&#8220;Address=&#8217;&#8221; + $_ + &#8220;&#8216;&#8221;) -ComputerName .}<br />
$PingHosts | ForEach-Object -Process $WmiPingStatus | Select-Object -Property Address,StatusCode |<br />
foreach {<br />
# If StatusCode is equal to 0 then do nothing (since 0 = success)<br />
If ($_.StatusCode -eq 0)</p>
<p style="padding-left: 30px;">    {<br />
# Write-Host &#8220;Do nothing for:&#8221; $_.Address<br />
}<br />
# Else, if StatusCode is NOT equal to 0 then do something<br />
Else<br />
{<br />
# Set e-mail subject and body using details of non-responsive host</p>
<p style="padding-left: 30px;">        $subject = &#8220;Attention: &#8221; + $_.Address + &#8221; is down!&#8221;;<br />
$body =  $_.Address + &#8221; is not responding to a ping request. Please take action.`n&#8221;</p>
<p style="padding-left: 30px;">        # Set e-mail objects and send e-mail</p>
<p style="padding-left: 30px;">        $smtpClient = New-Object Net.Mail.SmtpClient($smtpServer);<br />
$emailFrom  = New-Object Net.Mail.MailAddress $smtpFrom, $smtpFrom;<br />
$emailTo    = New-Object Net.Mail.MailAddress $smtpTo, $smtpTo;<br />
$mailMsg    = New-Object Net.Mail.MailMessage($emailFrom, $emailTo, $subject, $body);<br />
$smtpClient.Send($mailMsg)</p>
<p style="text-align: left; padding-left: 30px;">    }<br />
}</p>
<h2><strong>Disk Space Checker</strong></h2>
<p>Hand in hand with my previous script to check whether a host is alive or not, it is important to keep an eye on disk space as low storage could result in performance issues or, at its worst, the system grinding to a halt. The idea behind this script is to use a WMI object to check, at specified intervals, if storage space for each drive on a given machine is less than xGB (5GB in this example) and take action based on this condition; if free space is less than the threshold then perform an action (e.g. delete all files in a given folder – an application log folder for example) and send a notification email, if free space is greater than the threshold then do nothing.</p>
<p>To construct this script, we need the following main elements:</p>
<p>1)     The SMTP details for sending the email</p>
<p>2)     An Array to store machines to check</p>
<p>3)     The Get-WmiObject cmdlet that uses the Win32_LogicalDisk class</p>
<p>4)     A ForEach loop to perform an operation on each element in the Array</p>
<p>5)     An If statement to perform a conditional action based on the result.</p>
<p>The first part of the script sets the email properties and stores them in a variable; $smtpServer holds the SMTP Server Name/IP Address, $smtpFrom stores the FROM address and $smtpTo stores the TO address.</p>
<p>An Array called $machines is used to store the machines we want to check disk space on. The Win32_LogicalDisk class in the Get-WmiObject cmdlet is used to obtain the drive information for each machine in the $machines variable. The ‘-Authentication PacketPrivacy’ property is used to specify the authentication method, which encrypts all the data that is transferred between the client and the script that is authenticating. The ‘-Impersonation Impersonate’ property is used to specify the impersonation level to use, which allows the objects to use the credentials of the caller. The Where-Object cmdlet is used to retrieve local disk drives only (i.e. DriveType -eq 3), and Select-Object specifies to pull back the SystemName, VolumeName, FreeSpace, and Size information related to each drive.</p>
<p>A ForEach loop and If statement is used to circle through the FreeSpace information of each drive and check if it is greater than 5GB. If it is greater than 5GB then no action is taken. If it is less than 5GB then the Remove-Item cmdlet handles deleting all data in the folder specified within the $cleanDir variable and the email subject and body are set using the details of each machine and drive being checked. Finally, an email message is sent using the Net.Mail.SmtpClient class. The image below shows a sample of the notification email that will be sent out to the address stored in $smtpTo.</p>
<p><strong>Note:</strong> The Remove-Item cmdlet can be removed from the script altogether, if you wish for no action to be taken and only an email notification sent out. Alternatively, edit the folder location to be a directory from where you wish files to be removed (e.g. a log files folder).</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2012/12/SpaceNotifyEmail.png"><img class="aligncenter size-medium wp-image-10076" title="SpaceNotifyEmail" src="http://www.gfi.com/blog/wp-content/uploads/2012/12/SpaceNotifyEmail-300x142.png" alt="" width="300" height="142" /></a></p>
<p>&nbsp;</p>
<h3><strong>Script:</strong></h3>
<p style="padding-left: 30px;"># Set e-mail properties</p>
<p style="padding-left: 30px;">$smtpServer  = &#8220;192.168.0.5&#8243;;</p>
<p style="padding-left: 30px;">$smtpFrom = &#8220;notify@yourdomain.com&#8221;;</p>
<p style="padding-left: 30px;">$smtpTo = &#8220;admin@domain.local&#8221;;</p>
<p style="padding-left: 30px;"># Create an Array to store the destination hosts to ping</p>
<p style="padding-left: 30px;">[Array] $machines = &#8220;192.168.0.5&#8243;, &#8220;localhost&#8221;</p>
<p style="padding-left: 30px;"># Execute the Get-WmiObject win32_logicaldisk class against the array of machines</p>
<p style="padding-left: 30px;">Get-WmiObject Win32_LogicalDisk -computername $machines -Authentication PacketPrivacy -Impersonation Impersonate | Where-Object { $_.DriveType -eq 3 } | Select-Object SystemName,VolumeName,FreeSpace,Size | foreach {</p>
<p style="padding-left: 30px;"># If FreeSpace is greater than 5GB then do nothing</p>
<p style="padding-left: 30px;">If ($_.FreeSpace -gt 5GB)</p>
<p style="padding-left: 30px;">    {</p>
<p style="padding-left: 30px;">        #do nothing</p>
<p style="padding-left: 30px;">    }</p>
<p style="padding-left: 30px;"># Else, if FreeSpace is less than 5GB then do something</p>
<p style="padding-left: 30px;">Else</p>
<p style="padding-left: 30px;">    {</p>
<p style="padding-left: 30px;">        # Delete all items from the C:\Temp folder</p>
<p style="padding-left: 30px;">        $cleanDir = &#8220;C:\Temp\*&#8221;</p>
<p style="padding-left: 30px;">        Remove-Item $cleanDir -Recurse -ea SilentlyContinue</p>
<p style="padding-left: 30px;">        # Set e-mail subject and body using disk volume and machine name info</p>
<p style="padding-left: 30px;">        $subject = &#8220;Attention: Disk space is running low on &#8221; + $_.SystemName + &#8220;&#8221;;</p>
<p style="padding-left: 30px;">        $body = $_.VolumeName + &#8221; drive has less than 5GB. Files from the &#8221; + $cleanDir + &#8221; folder have been deleted.`n&#8221;</p>
<p style="padding-left: 30px;">        # Send e-mail</p>
<p style="padding-left: 30px;">        $smtpClient = New-Object Net.Mail.SmtpClient($smtpServer);</p>
<p style="padding-left: 30px;">        $emailFrom  = New-Object Net.Mail.MailAddress $smtpFrom, $smtpFrom;</p>
<p style="padding-left: 30px;">        $emailTo    = New-Object Net.Mail.MailAddress $smtpTo, $smtpTo;</p>
<p style="padding-left: 30px;">        $mailMsg    = New-Object Net.Mail.MailMessage($emailFrom, $emailTo, $subject, $body);</p>
<p style="padding-left: 30px;">        $smtpClient.Send($mailMsg)</p>
<p style="padding-left: 30px;">    }</p>
<p style="padding-left: 30px;">       }</p>
<p>When discussing both scripts, I mentioned automating them by having them run at scheduled intervals. To do this, you need to make use of the Windows Task Scheduler. Open the Task Scheduler from Start &gt; All Programs &gt; Accessories &gt; System Tools (or type taskschd.msc in the Run box). Right click on Task Scheduler (Local) and choose “Create Basic Task…”. Follow the wizard and at the ‘Action’ page, choose “Start a Program” and type “PowerShell” as the Program/Script and specify the full path to the .ps1 script as an argument (see screenshot below). Press Next and Finish to close the wizard.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2012/12/TaskAction.png"><img class="aligncenter size-medium wp-image-10077" title="TaskAction" src="http://www.gfi.com/blog/wp-content/uploads/2012/12/TaskAction-300x208.png" alt="" width="300" height="208" /></a></p>
<p>Now, from the Task Scheduler Library, choose the task you just created and right click &gt; Properties to bring up the properties window. Go to the “Triggers” tab, select the Daily trigger and click Edit. In Advanced Settings, select “Repeat task every:” and choose the number of minutes you wish to have the task run. Click OK and OK again to close the task window. The Ping &amp; Notify or Disk Space Checker PowerShell script should now automatically run every X minutes.</p>
<p>Both these articles have covered some of the most popular Network Admin responsibilities; storage, network availability, permissions and troubleshooting. As I alluded to earlier, the beauty of PowerShell scripts is their intuitive and customizable nature. I’m sure you will find a use for the scripts covered in these two articles – you can also tweak them even further and incorporate them into your own scripting toolkit.</p>
<p><em>Like our posts? Subscribe to our <a href="http://feeds.feedburner.com/TalkTechToMe-All">RSS feed</a> or email feed (on the right hand side) now, and be the first to get them!</em></p>
<p>&nbsp;</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/windows-powershell-essential-admin-scripts-part-2/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Windows PowerShell™: Essential Admin Scripts (Part 1)</title>
		<link>http://www.gfi.com/blog/windows-powershell-essential-admin-scripts-part-1/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=windows-powershell-essential-admin-scripts-part-1</link>
		<comments>http://www.gfi.com/blog/windows-powershell-essential-admin-scripts-part-1/#comments</comments>
		<pubDate>Fri, 07 Dec 2012 14:52:20 +0000</pubDate>
		<dc:creator>Andrew Zammit Tabona</dc:creator>
				<category><![CDATA[Tech Zone]]></category>
		<category><![CDATA[Microsoft Troubleshooting Packs]]></category>
		<category><![CDATA[PowerShell]]></category>
		<category><![CDATA[PowerShell script]]></category>
		<category><![CDATA[Troubleshooting Pack]]></category>
		<category><![CDATA[Windows 7]]></category>
		<category><![CDATA[Windows PowerShell]]></category>
		<category><![CDATA[Windows Server 2008]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=9975</guid>
		<description><![CDATA[In Windows PowerShell: Extracting Strings Using Regular Expressions, I introduced the Windows PowerShell and discussed the concept of regular expressions, giving an example of how to build a Windows PowerShell script to extract strings from a file using a given &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.gfi.com/blog/wp-content/uploads/2012/08/powershell.png"><img class="alignright  wp-image-9173" style="margin: 6px 10px; border: 0px solid black;" title="PowerShell" src="http://www.gfi.com/blog/wp-content/uploads/2012/08/powershell-300x202.png" alt="" width="240" height="162" /></a>In <a href="http://www.gfi.com/blog/windows-powershell-extracting-strings-using-regular-expressions/"><em>Windows PowerShell: Extracting Strings Using Regular Expressions</em></a><em>,</em><em> </em>I introduced the Windows PowerShell and discussed the concept of regular expressions, giving an example of how to build a Windows PowerShell script to extract strings from a file using a given regular expression. In this two part series, I will discuss a number of PowerShell scripts to assist with some of the fundamental administration and troubleshooting tasks. We will touch on the Microsoft Troubleshooting Packs, discuss a script for checking file and folder permissions, a script for monitoring storage space, as well as one for determining if a host is alive and notifying a given user.<span id="more-9975"></span></p>
<p><strong>Microsoft Troubleshooting Packs</strong></p>
<p>I thought it would be worth starting off by mentioning the Microsoft Troubleshooting Packs that are bundled with Windows 7, Windows Server 2008 and above. The Microsoft Troubleshooting Packs are a series of detection, resolution and verification PowerShell scripts that you can use to diagnose different aspects of your servers, clients or network. Different packages are available to troubleshoot printers, networks, performance, power, Windows Update, etc.</p>
<p>To see which components are available for troubleshooting, simply run the <em>dir</em> command against the directory that holds the scripts. You will get a list like the one shown in the image below:</p>
<p>dir C:\Windows\diagnostics\system</p>
<p style="text-align: center;"><a href="http://www.gfi.com/blog/wp-content/uploads/2012/12/Windows-diagnostics-system.png"><img class="size-medium wp-image-9976 aligncenter" style="border: 0px solid black; margin-top: 10px; margin-bottom: 10px;" title="Windows diagnostics system" src="http://www.gfi.com/blog/wp-content/uploads/2012/12/Windows-diagnostics-system-300x166.png" alt="" width="300" height="166" /></a></p>
<p>To run a Troubleshooting Pack, you will first need to import the modules associated with the pack by running the following command from the Windows PowerShell command window:</p>
<p><strong>Import-Module TroubleshootingPack</strong><strong></strong></p>
<p>You then specify the <a href="http://msdn.microsoft.com/en-gb/library/windows/desktop/dd323716(v=vs.85).aspx">Get-TroubleshootingPack</a> cmdlet along with the desired pack location and pipe it to the <a href="http://msdn.microsoft.com/en-gb/library/windows/desktop/dd323718(v=vs.85).aspx">Invoke-TroubleshootingPack</a> cmdlet as follows:</p>
<p>Get-TroubleshootingPack &lt;TroubleshootingPackLocation&gt; | Invoke-TroubleshootingPack</p>
<p>The image below shows the options available when the Network Troubleshooting Pack is invoked:</p>
<p style="text-align: center;"><a href="http://www.gfi.com/blog/wp-content/uploads/2012/12/when-the-Network-Troubleshooting-Pack-is-invoked.png"><img class="size-medium wp-image-9977 aligncenter" title="when the Network Troubleshooting Pack is invoked" src="http://www.gfi.com/blog/wp-content/uploads/2012/12/when-the-Network-Troubleshooting-Pack-is-invoked-300x104.png" alt="" width="300" height="104" /></a></p>
<p>It is likely that you will want to run these scripts on a remote machine (e.g. a Windows 7 client). To do so, you will first need to connect to the remote machine from PowerShell using the “Enter-PSSession” cmdlet, as shown below:</p>
<p>Enter-PSSession -ComputerName remotehost -Credential domain\adminaccount</p>
<p>Replace ‘remotehost’ with the name or IP address of the remote machine and ‘domain\adminaccount’ with an admin level account on the domain. A dialog box will appear asking you to enter the password for the ‘domain\adminaccount’, following which you will have initiated a remote management session within PowerShell to execute commands on the remote machine.</p>
<p><strong>Note:</strong> Ensure that the Windows Remote Management service is running and that you have configured the remote machine to allow Remote Management connections (using the <em>winrm quickconfig</em> command).</p>
<p><strong>Checking ACL Permissions on Files and Folders</strong></p>
<p>Whether for troubleshooting or simply for verification purposes, you will often find the need to check ACL permissions on files or folders. In larger environments where permissions are granted on files and folders on a regular basis, a permissions review may take place every quarter for example, and having an ACL report to compare with would come in handy.<strong></strong></p>
<p>To construct this script, you need the following main elements:</p>
<p>1) The path to check permissions on</p>
<p>2) The output path to create the report file</p>
<p>3) An Array to store each enumerated path</p>
<p>4) A ForEach loop to perform an operation on each object in the Array</p>
<p>5) The Get-Acl cmdlet.</p>
<p>The first part of the script asks the user for the path to check permissions on, as well as the path for the output file, and stores the results in a variable called <em>$Path</em> and <em>$OutFilePath</em> respectively. The Get-Date cmdlet is used twice; once to hold the current date and time in the <em>$ReportDate</em> variable and another to store the current date and time in a custom format within the <em>$FileTS</em> variable (which is used to create a timestamp for the output filename). The <em>$ReportUser</em> variable holds the name of the currently logged on user in the domain\username format.</p>
<p>An <em>if</em> statement is used to check if the path stored in the <em>$OutFilePath</em> variable exists. If it doesn’t exist, it will be created automatically using the New-Item (abbreviated to <em>ni</em>) cmdlet. The filename of the report is then appended to the output path and stored in the <em>$FullOutFile</em> variable.</p>
<p>Various variables, such as <em>$RptNameInfo</em>, <em>$DateInfo</em> and <em>$PathInfo</em>, are used to add the main pieces of information to the report. The <em>$NumFolders</em> and <em>$NumFiles</em> variables store the count of folders and files respectively, and uses the Get-ChildItem (or <em>gci</em> for short) cmdlet to pull back all the files and folders that fall under the location stored in <em>$Path</em>.</p>
<p>An Array is then created to store each of the enumerated file and folder paths and a ForEach loop handles the processing of the data within the Array. For each object in the Array, the path is converted from the PowerShell path to a standard system path. The size of each folder and file is obtained using the Measure-Object cmdlet and stored in a variable called <em>$PathSizeCount</em>. <em>$PathSizeCountKB</em> and <em>$PathSizeCountMB</em> store the size in KB and MB respectively. The path and size information for each folder or file is then added to the report.</p>
<p>Finally, the Get-Acl cmdlet is run against all the enumerated paths within <em>$PSPath </em>and formatted using the format-list (or <em>fl</em> for short) command. All this is added to the file specified in the <em>$FullOutFile</em> variable.</p>
<p><strong>Script:</strong></p>
<p style="padding-left: 30px;"># set variables</p>
<p style="padding-left: 30px;">$Path = Read-Host &#8220;Enter path to check permissions on&#8221;</p>
<p style="padding-left: 30px;">$OutFilePath = Read-Host &#8220;Enter path to store output file&#8221;</p>
<p style="padding-left: 30px;">$ReportDate = Get-Date -format F</p>
<p style="padding-left: 30px;">$ReportUser = [System.Security.Principal.WindowsIdentity]::GetCurrent().Name</p>
<p style="padding-left: 30px;">$FileTS = Get-Date -format &#8220;yyyy.M.dd.hh.mm.ss&#8221;</p>
<p style="padding-left: 30px;">$ReportFileTS = $FileTS.replace(&#8216;.&#8217;,&#8221;)</p>
<p style="padding-left: 30px;"># check if path to output file exists, if not create it</p>
<p style="padding-left: 30px;">if(!(Test-Path -Path $OutFilePath))</p>
<p style="padding-left: 30px;">{</p>
<p style="padding-left: 30px;">    ni -Path $OutFilePath –ItemType Directory -Force</p>
<p style="padding-left: 30px;">}</p>
<p style="padding-left: 30px;"># construct full path to output file</p>
<p style="padding-left: 30px;">$FullOutFile = &#8220;$outfilepath\ACLCheckReport.$reportfilets.txt&#8221;</p>
<p style="padding-left: 30px;"># add main report info</p>
<p style="padding-left: 30px;">$RptNameInfo = &#8220;==============================`r`n    ACL Permissions Report    `r`n==============================&#8221;</p>
<p style="padding-left: 30px;">$RptNameInfo | ft | Out-File $FullOutFile</p>
<p style="padding-left: 30px;">$DateInfo = &#8220;Created on: $reportdate `r`nCreated by: $reportuser`r`n`==============================`r`n&#8221;</p>
<p style="padding-left: 30px;">$DateInfo | ft | Out-File -append $FullOutFile</p>
<p style="padding-left: 30px;">$NumFolders = (gci $Path -recurse | where {$_.PsIsContainer}).Count</p>
<p style="padding-left: 30px;">$NumFiles = (gci $Path -recurse | where {$_.GetType() -match &#8220;fileInfo&#8221;} | measure-object).Count</p>
<p style="padding-left: 30px;">$PathInfo = &#8220;Listing permissions for: $path ( Folders: $numfolders | Files: $numfiles )`r`n&#8221;</p>
<p style="padding-left: 30px;">$PathInfo | ft | Out-File -append $FullOutFile</p>
<p style="padding-left: 30px;"># fill array with folders and files</p>
<p style="padding-left: 30px;">[Array] $Objects = gci -path $Path -force -recurse</p>
<p style="padding-left: 30px;"># fill array with folders only</p>
<p style="padding-left: 30px;">#[Array] $Objects = gci -path $path -force -recurse | Where {$_.PSIsContainer}</p>
<p style="padding-left: 30px;"># process data in array</p>
<p style="padding-left: 30px;">ForEach ($Object in [Array] $Objects)</p>
<p style="padding-left: 30px;">{</p>
<p style="padding-left: 30px;"># convert pspath to full system path</p>
<p style="padding-left: 30px;">$PSPath = (Convert-Path $Object.PSPath)</p>
<p style="padding-left: 30px;"># get the size of each folder/file</p>
<p style="padding-left: 30px;">$PathSizeCount = (gci $PSPath -recurse | Measure-Object -property length -sum).Sum</p>
<p style="padding-left: 30px;">$PathSizeCountKB = &#8220;{0:N2}&#8221; -f ($PathSizeCount / 1KB)</p>
<p style="padding-left: 30px;">$PathSizeCountMB = &#8220;{0:N2}&#8221; -f ($PathSizeCount / 1MB)</p>
<p style="padding-left: 30px;"># add path and size info for each folder/file to the report</p>
<p style="padding-left: 30px;">$PathSizeInfo = (&#8220;Path: $PSPath `r`nSize (KBytes): $PathSizeCountKB | Size (MBytes): $PathSizeCountMB&#8221;)</p>
<p style="padding-left: 30px;">$PathSizeInfo | ft | Out-File -append $FullOutFile</p>
<p style="padding-left: 30px;"># run the get-acl command using the list of enumerated paths and format accordingly</p>
<p style="padding-left: 30px;">Get-Acl -path $PSPath | fl -property Owner,AccessToString | Out-File -append $FullOutFile</p>
<p style="text-align: left; padding-left: 30px;">}</p>
<p>Uncomment the following code within the script to change it so that only folders and sub-folders are enumerated as part of the permissions list:</p>
<p>#[Array] $folders = gci -path $path -force -recurse | Where {$_.PSIsContainer}</p>
<p>Then, add a comment tag to the following code within the script to disable files from being enumerated as part of the permissions list:</p>
<p>[Array] $objects = gci -path $path -force –recurse</p>
<p>The following shows a sample ACL Permissions Report.</p>
<p><strong>Note:</strong> The format of the report can be modified by changing the “ft” and “fl” portions of the script accordingly.</p>
<p style="text-align: center;"><a href="http://www.gfi.com/blog/wp-content/uploads/2012/12/notepad.png"><img class="size-medium wp-image-9979 aligncenter" title="notepad" src="http://www.gfi.com/blog/wp-content/uploads/2012/12/notepad-300x183.png" alt="" width="300" height="183" /></a></p>
<p>In Part 2, we will look at two more scripts, one to check if a host is alive and trigger a notification event, and another to check for storage space and take action accordingly if a certain threshold is reached.</p>
<p>&nbsp;</p>
<p><em>Like our posts? Subscribe to our <a href="http://feeds.feedburner.com/TalkTechToMe-All">RSS feed</a> or email feed (on the right hand side) now, and be the first to get them!</em></p>
<p>&nbsp;</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/windows-powershell-essential-admin-scripts-part-1/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>BYOD &#8211; The Good, the Bad and the Ugly</title>
		<link>http://www.gfi.com/blog/byod-the-good-the-bad-and-the-ugly/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=byod-the-good-the-bad-and-the-ugly</link>
		<comments>http://www.gfi.com/blog/byod-the-good-the-bad-and-the-ugly/#comments</comments>
		<pubDate>Wed, 22 Aug 2012 15:46:34 +0000</pubDate>
		<dc:creator>Andrew Zammit Tabona</dc:creator>
				<category><![CDATA[Tech Zone]]></category>
		<category><![CDATA[TTTM]]></category>
		<category><![CDATA[Bring your own device]]></category>
		<category><![CDATA[BYOD]]></category>
		<category><![CDATA[device]]></category>
		<category><![CDATA[risk assessment]]></category>
		<category><![CDATA[Security]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=9271</guid>
		<description><![CDATA[BYOD (Bring Your Own Device) is a term used to describe employees who take their own portable device (e.g. iPhones, iPads and laptops) to the workplace with the intention of accessing firm resources to carry out their everyday jobs. The &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.gfi.com/blog/wp-content/uploads/2012/08/BYOD.jpg"><img class="size-medium wp-image-9277 alignright" style="border: 0px solid black; margin: 10px;" title="BYOD" src="http://www.gfi.com/blog/wp-content/uploads/2012/08/BYOD-300x256.jpg" alt="" width="300" height="256" /></a>BYOD (Bring Your Own Device) is a term used to describe employees who take their own portable device (e.g. iPhones, iPads and laptops) to the workplace with the intention of accessing firm resources to carry out their everyday jobs. The concept also extends to users who use their own devices for work purposes while out and about.</p>
<p>BYOD is a growing trend. It is being talked about at all levels inside and out of the organization, including up to board level. It’s a hot topic, one which many organizations are embracing and others are not. If you’re sitting on the fence and not sure which direction to take, you should be aware that there are many aspects to consider.</p>
<p>This article will highlight some of the pros and cons from a business perspective, as well as the security considerations that this trend brings.<span id="more-9271"></span></p>
<h2></h2>
<p>First, let’s look at some of the benefits of BYOD. These include:</p>
<h3>Productivity:</h3>
<p>The idea behind BYOD is that employees can access organizational data anytime, anywhere, from their own personal device, which naturally encourages increased productivity. If you have access to work e-mails for example, there is always going to be that temptation to “see what’s new” or “just answer this one e-mail” every now and then.</p>
<h3>Convenience:</h3>
<p>Rather than having to carry around two devices (the employee’s own personal device and a firm owned device) employees are able to use their own device to carry out both functions.</p>
<h3>Organization Appeal:</h3>
<p><strong></strong>In such a competitive market, it’s sometimes not only the pay packet that counts, but the little perks and privileges that attract the best talent and make them want to stay. Promoting the fact that your organization has embraced BYOD only adds to its appeal for prospective employees.</p>
<h3>Cost Savings:</h3>
<p><strong></strong>Rather than the organization paying for an additional device and a service contract, they can shift the cost to the user. Organizations might choose to pay nothing, only pay for the service contract, or perhaps provide an allowance to employees who wish to use their personal device for work purposes. Whatever you choose, aim for a simplified cost model. Trying to differentiate between personal and business usage for costing purposes can be a nightmare.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2012/08/BOYD-the-risk.jpg"><br />
</a></p>
<p>Despite the benefits, there are some things to consider, as emphasized below.</p>
<p>Firstly, nothing new should be implemented into the organization without a formal risk assessment. A risk assessment should be carried out to:</p>
<h3>1. Identify the associated BYOD risks that are applicable to your organization</h3>
<h3>2. Help you to draw up a mitigation strategy for any identified risks</h3>
<h3>3. Decide if the identified risks are something you are willing to accept</h3>
<p style="text-align: center;"><a href="http://www.gfi.com/blog/wp-content/uploads/2012/08/BOYD-the-risk1.jpg"><img class="size-medium wp-image-9275 aligncenter" style="border: 0px solid black; margin-top: 10px; margin-bottom: 10px;" title="Risk assessment when adopting BYOD" src="http://www.gfi.com/blog/wp-content/uploads/2012/08/BOYD-the-risk1-300x197.jpg" alt="" width="300" height="197" /></a></p>
<p style="text-align: left;">A risk assessment should pinpoint areas within the environment that need to be looked at when adopting BYOD. Some things to consider are:</p>
<h3>1. Which software are you going to use?</h3>
<p>From a security perspective, implementation of the right software at both the server level and end user device level are highly important.</p>
<h3>2. Which resources are you going to allow access to?</h3>
<p>Are you only going to allow calendar, contacts and e-mail access? Will employees be able to access the client database?</p>
<h3>3. Will you segregate ‘mobile access’ data?</h3>
<p>Ideally, once you have classified the types of data you are going to allow mobile access to, you will then segregate that data from the rest of the firm’s resources, limiting unnecessary exposure. Hand in hand with this is the need to decide how to serve that data. Will it be available only via a secure page? Do you have an in-house or third party application that will allow access?</p>
<h3>4. How will you deliver ‘mobile access’ data?</h3>
<p>As I alluded to earlier, choosing the right data delivery method is critical. Whichever solution you choose, you will want it to contain encryption at the device, server and data transport level. Some solutions allow you to install an application on the iPhone or iPad which acts as a secure, encrypted, container for accessing firm data. Users would authenticate, and data would be transferred to and from the firm’s resources and viewed within the secure container.</p>
<h3>5. Who does liability fall with?</h3>
<p>Another, often forgotten, aspect to consider is liability. If users are using their own device for work purposes and something happens to that device, who is liable for the cost of repairing or replacing it?</p>
<h3>6. If a device is lost, how do you ensure the protection of company data on the device?</h3>
<p>Some organizations have a mitigation strategy in place that allows them to trigger a remote wipe of the device as soon as they receive word of it being lost. However, remote wipe functionality is only good if the device still has battery power and signal. If someone were to obtain the device and remove the SIM card or put the device into “Aeroplane Mode”, then this feature is pretty much useless.</p>
<h3> 7. Which devices will you support?</h3>
<p>One of the biggest BYOD security problems is that it is impossible for IT to have an understanding of each and every mobile device and mobile platform available on the market today. This means managing the installation and updating of AV on the mobile devices becomes difficult, as does support for all these devices.</p>
<h3>8. Employee acceptance of data ownership and usage policy</h3>
<p>Even if, as an organization, you decide to embrace BYOD, your users may not. Because the organization owns the data that resides on the device, it will want to enforce some control over its use and protection. A lot of users will not feel comfortable with the organization analyzing their phone if they leave the firm, or performing a remote wipe of the device if it is lost or stolen. It is important to have clearly defined security policies and usage guidelines that outline the firm’s expectations. Cover yourself legally by ensuring that employees read, understand and sign these documents.</p>
<h3>9. Are we going to control which devices can connect to the network?</h3>
<p>BYOD shouldn’t just be a “free for all”. There needs to be a device specific control in place that ensures only known devices are allowed to connect to the network.</p>
<p>As such, there really isn’t an all-in-one BYOD security strategy. The best approach would be to use a combination of several security factors to help reduce risk.</p>
<p><img class="alignright  wp-image-9278" style="border: 0px solid black; margin: 10px;" title="Question before deciding whether to jump on the BYOD bandwagon" src="http://www.gfi.com/blog/wp-content/uploads/2012/08/Question-before-deciding-whether-to-jump-on-the-BYOD-bandwagon1-275x300.jpg" alt="" width="248" height="270" /><br />
All things considered, it will come down to trying to balance productivity and security. Are you comfortable with the security risks involved when adopting the BYOD model versus the potential increase in productivity across the firm? Do the productivity gains outweigh the security risks? Are you going to get a return on investment (ROI) if you implement BYOD across the firm, or will the cost of dealing with a security incident offset the benefits? What controls do you have in place if a security leakage or data loss incident had to occur? What data are you allowing access to, and who are you allowing to access it? Will your BYOD model comply with existing industry regulations for data protection?</p>
<p>These are all questions you need to think about when deciding whether to jump on the BYOD bandwagon. With the right security measures in place, it is only a case of questioning whether you are willing to accept the additional risk, and then getting sign off from the right people!</p>
<p>&nbsp;</p>
<p><em>Like our posts? Subscribe to our <a href="http://feeds.feedburner.com/TalkTechToMe-All">RSS feed</a> or email feed (on the right hand side) now, and be the first to get them!</em></p>
<p>&nbsp;</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/byod-the-good-the-bad-and-the-ugly/feed/</wfw:commentRss>
		<slash:comments>3</slash:comments>
		</item>
	</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

 Served from: www.gfi.com @ 2013-09-14 20:36:38 by W3 Total Cache --