Follow GFI:
Find us on Facebook Follow us on Twitter Find us on Linkedin Subscribe to our RSS Feed Find us on YouTube Find us on Google+
 

Author Archives: Ed Fisher

About Ed Fisher

Ed Fisher is an information systems manager and blogger at several sites including his own site, http://retrohack.com. An InfoTech professional, aficionado of capsaicin, and Coffea canephora (but not together,) he has been getting my geek on full-time since 1993, and has worked with information technology in some capacity since 1986. Stated simply, if you need to get information securely from point A to B, he’s your guy. He is like "The Transporter," but for data, and without the car; and with a little more hair.

4 Reasons to monitor Internet usage within your organization

4 Reasons to monitor Internet usage within your organization

on June 23, 2011

If you look at the range of activities that companies undertake to monitor Internet access, it can run the gamut from the extreme to the apathetic. Companies who want to maintain absolute control over their employee’s Internet usage may take …

Read the Full Story
5
It’s 10 O’clock; Do You Know What Your Employees Are Doing on the Web?

It’s 10 O’clock; Do You Know What Your Employees Are Doing on the Web?

on June 7, 2011

I don’t want to be the Internet police. Neither do you. We both have far more important things to do at work than worry about what our coworkers are doing on the Internet. Whether we are deploying patches, reviewing our …

Read the Full Story
4
The 16 Most (Potentially) Dangerous Applications on your Network

The 16 Most (Potentially) Dangerous Applications on your Network

on May 2, 2011

System admins know the importance of keeping up with operating systems patches on their workstations and servers, and making sure their antivirus definitions are kept up to date. We plan for and test regularly Microsoft’s monthly releases, and ensure 100% …

Read the Full Story
10
How to repair PST files

How to repair PST files

on April 13, 2011

One of the biggest problems users encounter when using PSTs is that they can corrupt. Because there are countless messages within a PST that could easily be lost when the file becomes corrupt, knowing how to repair PST files is …

Read the Full Story
2
Top 3 Patch Management Do’s and Don’ts

Top 3 Patch Management Do’s and Don’ts

on March 28, 2011

A successful patch management process is a critical part of any network, no matter how many or how few systems you are maintaining. There are a few key things you should include to maximize the effectiveness of your patching process, …

Read the Full Story
4
10 Tips for Successful Email Archiving

10 Tips for Successful Email Archiving

on February 28, 2011

While companies with unlimited storage, tiers of redundant servers, and high-speed WAN links may want to provide unlimited online storage for their users, the rest of us have to contend with budgets, hardware limitations, and bandwidth that is never enough. …

Read the Full Story
6
6 Tips for a Successful Patching Process

6 Tips for a Successful Patching Process

on January 27, 2011

Whether your servers run Windows or Linux, whether your workstations are Windows 7 or Macs, and no matter what vendor your network gear comes from, one of the most critical administrative tasks for admins of any system is patching. With …

Read the Full Story
3
5 Popular Hacking Techniques – Do you know your enemies? (Part 2)

5 Popular Hacking Techniques – Do you know your enemies? (Part 2)

on November 30, 2010

Welcome back. In part one, we explained the importance of understanding the threats against your network and looked at three common hacking techniques that the bad guys might use against you. They included Attacking Defaults, SQL Injection, and Exploiting Unpatched …

Read the Full Story
5
5 Popular Hacking Techniques – Do you know your enemies?

5 Popular Hacking Techniques – Do you know your enemies?

on November 29, 2010

“Know your enemy and know yourself and you can fight a hundred battles without disaster.” – Sun Tzu While the famous Chinese general may not have had hacking techniques in mind when he penned The Art of War some 2500 …

Read the Full Story
7