<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Talk Tech To Me - GFI Blog &#187; Ed Fisher</title>
	<atom:link href="http://www.gfi.com/blog/author/ed-fisher/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.gfi.com/blog</link>
	<description>Brought to you by GFI Software</description>
	<lastBuildDate>Fri, 09 Aug 2013 17:06:10 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
		<item>
		<title>4 Reasons to monitor Internet usage within your organization</title>
		<link>http://www.gfi.com/blog/reasons-monitor-internet-usage-organization/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=reasons-monitor-internet-usage-organization</link>
		<comments>http://www.gfi.com/blog/reasons-monitor-internet-usage-organization/#comments</comments>
		<pubDate>Thu, 23 Jun 2011 11:01:35 +0000</pubDate>
		<dc:creator>Ed Fisher</dc:creator>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[SMB Zone]]></category>
		<category><![CDATA[bandwidth]]></category>
		<category><![CDATA[compliance]]></category>
		<category><![CDATA[costs]]></category>
		<category><![CDATA[internet monitoring]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[monitor Internet access]]></category>
		<category><![CDATA[monitor Internet usage]]></category>
		<category><![CDATA[productivity]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3340</guid>
		<description><![CDATA[If you look at the range of activities that companies undertake to monitor Internet access, it can run the gamut from the extreme to the apathetic. Companies who want to maintain absolute control over their employee’s Internet usage may take &#8230;]]></description>
				<content:encoded><![CDATA[<p><img class="alignright size-medium wp-image-3341" style="margin: 10px; border: black 0px solid;" title="monitor Internet usage for business and employee security" src="http://www.gfi.com/blog/wp-content/uploads/2011/06/monitor-Internet-usage-for-business-and-employee-security-300x200.jpg" alt="" width="300" height="200" />If you look at the range of activities that companies undertake to monitor Internet access, it can run the gamut from the extreme to the apathetic. Companies who want to maintain absolute control over their employee’s Internet usage may take measures that include recording and reviewing everything that users do on the web. They might even use a proxy server that only permits access for a subset of users and to only a list of business approved websites. On the other side of the spectrum you may find companies that don’t want to create a feeling of mistrust and, as a result, don’t monitor anything their users do online. Internet monitoring is still a critical part of maintaining the security of your organization. It doesn’t have to be the totalitarian approach of the first extreme above, but it needs to take an active role in protecting your users and your data resources from the murkier parts of the web.<span id="more-3340"></span></p>
<p>There are four critical reasons to monitor Internet usage within your organization. Without having to single out any one user or play Internet Cop, these four reasons should be more than enough to convince you that at the very least, some aggregate reporting and proactive defense measures are essential to protect the organization and the employees themselves. Together with each reason, I will share my own first-hand experience that made me appreciate the use of Internet monitoring.</p>
<p><strong>Malware<br />
</strong>Viruses don’t just spontaneously come into existence on your network. They get in through user actions; the majority of which include downloads of infected files or accessing compromised sites. These actions are often the results of perfectly innocent and well-meaning actions, since the site you trust completely today, might find itself hacked tomorrow. By monitoring users’ Internet activities, proactively scanning downloads (executable files, documents and scripts contained within web pages), and checking for things like cross-site scripting attacks and obfuscated URLs, an Internet monitoring system helps to protect your users from threats outside your control, like a vendor website that has been compromised. The last virus incident I was involved in occurred because a user accessed a file sharing site with the computer set aside for shipping. Because this was a standalone machine in an unsupervised area, it was easy for a user to surf the web, and the antivirus software had stopped working but was not being properly monitored. Internet monitoring caught the infected file before it got to the desktop, and that alert let us know we had a machine requiring attention.</p>
<p><strong>Compliance<br />
</strong>Compliance issues can come up when users access personal webmail sites, file sharing sites, or attempt to download copyrighted materials. By establishing a policy that prohibits these actions, and then implementing a technology that enforces this policy, a company can show good faith in meeting the requirements of any legislation or contractual obligations. A couple of years ago, a competitor filed a lawsuit against my employer. Part of the complaint alleged that users accessed this competitor’s website to download software using a third party’s credentials, which violated licensing agreements. Having logs to show that this did not occur proved very useful in court.</p>
<p><strong>Productivity<br />
</strong>There are perfectly legitimate reasons for users to access websites during work hours. There are also plenty of distractions that can lead a user to accidentally burn through an hour of their day, even though they might have started out with the intention to just check something quickly. While I am completely in favor of allowing users some recreational access to the Internet, it is easily something that can be misused. By monitoring the sites responsible for the largest amount of time spent online by employees, a company can bring up the subject in team or company meetings, without singling out any individual. A few years ago, a supervisor whose department was chronically behind schedule was found to be spending most of his day on gaming sites, instead of seeing to his team’s needs. HR addressed this with the supervisor, and the team immediately started meeting their goals.</p>
<p><strong>Costs<br />
</strong>One of the largest expenses for many IT groups is their monthly bandwidth bill. If anything seems slow, users are bound to complain, so it is a constant effort to stay on top of bandwidth utilization reports, and to buy bigger pipes as usage climbs. Of course, sometimes the top bandwidth consumers are not what the business had in mind when it allowed Internet access to everyone. Being able to tell just what is using up all the bandwidth,and to then decide whether a larger circuit or a conversation with a user is the proper course of action, can save hundreds to thousands of dollars a month. In this case, a remote site with a pair of bonded DS1s complained regularly that they needed a bigger pipe; applications timed out regularly and response was unacceptable. In reviewing the logs of the Internet Monitoring, we determined that some user was streaming movies all day, every day. By blocking that category of site without having to identify the user, the problems with application timeouts were eliminated, and we avoided spending thousands more to get a larger circuit into this (very) remote office.</p>
<p>In each case above, Internet monitoring directly contributed to solving a problem, without requiring the security team to spend all day watching what others were doing. In all four reasons, I personally found that the Internet monitoring solution we implemented paid for itself in the costs saved or avoided. By adding an Internet monitoring solution to your environment, you can add another layer of protection to your defense for both your business and your employees.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/reasons-monitor-internet-usage-organization/feed/</wfw:commentRss>
		<slash:comments>5</slash:comments>
		</item>
		<item>
		<title>It’s 10 O’clock; Do You Know What Your Employees Are Doing on the Web?</title>
		<link>http://www.gfi.com/blog/web-monitoring-solution/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=web-monitoring-solution</link>
		<comments>http://www.gfi.com/blog/web-monitoring-solution/#comments</comments>
		<pubDate>Tue, 07 Jun 2011 10:53:33 +0000</pubDate>
		<dc:creator>Ed Fisher</dc:creator>
				<category><![CDATA[Headline]]></category>
		<category><![CDATA[SMB Zone]]></category>
		<category><![CDATA[internet monitoring]]></category>
		<category><![CDATA[social media]]></category>
		<category><![CDATA[web monitoring]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3305</guid>
		<description><![CDATA[I don’t want to be the Internet police. Neither do you. We both have far more important things to do at work than worry about what our coworkers are doing on the Internet. Whether we are deploying patches, reviewing our &#8230;]]></description>
				<content:encoded><![CDATA[<p><a class="lightbox" title="web monitoring" href="http://www.gfi.com/blog/wp-content/uploads/2011/06/shutterstock_58984606.jpg"><img class="alignright size-medium wp-image-3306" style="margin: 10px; border: 0px solid black;" title="web monitoring" src="http://www.gfi.com/blog/wp-content/uploads/2011/06/shutterstock_58984606-300x200.jpg" alt="" width="300" height="200" /></a>I don’t want to be the Internet police. Neither do you. We both have far more important things to do at work than worry about what our coworkers are doing on the Internet. Whether we are deploying patches, reviewing our firewall logs, or adding disk space to our SAN, practically anything we might have to do is more enjoyable, and provides more return on investment, than auditing Internet access logs to see who hits Facebook, who is downloading music, and who might be surfing naughty sites. But whether you are concerned more about the productivity lost to recreational use of the Internet, the bandwidth consumed downloading content, the risk to company systems from malware, or the potential legal and HR issues that come with accessing inappropriate or copyrighted materials, we cannot simply let users surf any and all sites without some degree of control and protection.</p>
<p><span id="more-3305"></span><strong>Web monitoring can be a critical part of your defensive strategy, preventing violations of policy, protecting against malware, and conserving bandwidth.</strong></p>
<p>Web monitoring software is normally installed on a server at your border, or on an existing proxy server such as Microsoft’s Forefront TMG 2010. It protects your users in several ways, including assessing your users’ Internet access, and permitting or denying access to websites based on whitelists, blacklists, or categories. It can work with URL lists that are constantly updated and categorized to block access to sites deemed inappropriate by company policies. It also protects your users by scanning webpages for malicious scripts and downloads for malware, using multiple antivirus engines to scan downloaded content.</p>
<p>One of the biggest benefits to this approach is that the protection is in real-time, and can keep users out of harm’s way rather than simply logging that they did something wrong. Many times, users may click a link that they think is harmless, only to find out after the fact that it went somewhere they shouldn’t. Even safe sites might be compromised; scanning downloads helps to protect users from malware posted to hacked sites.</p>
<p>In some cases, logging individual access may prove to be necessary. Web monitoring software can be set up for logging all access to the web by any or all users. Logs can be reviewed to ensure compliance with policy or to investigate violations. Just be sure that your written policies cover this and that you have disclosed this activity to your users. Check with your HR and legal counsel to make sure everything is in accordance with company policy and legal requirements, and look for software that can anonymize data if you have users within Germany, Italy, or other jurisdictions with privacy laws that might impact logging of users’ activities.</p>
<p>Here are some other key features to look for in a web monitoring solution:</p>
<ul>
<li>Multiple antivirus engines to scan downloads for malware</li>
<li>The ability to terminate and inspect SSL traffic</li>
<li>A constantly updated URL database to help block categories that violate policy</li>
<li>Agentless install options to simplify deployment</li>
<li>Policies that can be enforced by user, group or ip.addr, and by time of day.</li>
</ul>
<p>Web monitoring software provides several key protections for your users, and your network. Whether you use this to review website access, or simply to prevent users from straying into the more questionable areas of the web, are entirely up to you. You can perform a periodic review of web access if management deems it necessary, or simply choose to use an automated process to block access to those parts of the web that don’t comply with company policy, but in all cases, protecting your users protects your systems.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/web-monitoring-solution/feed/</wfw:commentRss>
		<slash:comments>4</slash:comments>
		</item>
		<item>
		<title>The 16 Most (Potentially) Dangerous Applications on your Network</title>
		<link>http://www.gfi.com/blog/16-potentially-dangerous-applications-network/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=16-potentially-dangerous-applications-network</link>
		<comments>http://www.gfi.com/blog/16-potentially-dangerous-applications-network/#comments</comments>
		<pubDate>Mon, 02 May 2011 14:12:33 +0000</pubDate>
		<dc:creator>Ed Fisher</dc:creator>
				<category><![CDATA[Headline]]></category>
		<category><![CDATA[Tech Zone]]></category>
		<category><![CDATA[browser security]]></category>
		<category><![CDATA[patch management]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[system patches]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3262</guid>
		<description><![CDATA[System admins know the importance of keeping up with operating systems patches on their workstations and servers, and making sure their antivirus definitions are kept up to date. We plan for and test regularly Microsoft’s monthly releases, and ensure 100% &#8230;]]></description>
				<content:encoded><![CDATA[<p><a class="lightbox" title="16 Security Application" href="http://www.gfi.com/blog/wp-content/uploads/2011/04/16-Security-Application.jpg"><img class="alignright size-medium wp-image-3263" style="margin: 10px; border: 0px solid black;" title="16 Security Application" src="http://www.gfi.com/blog/wp-content/uploads/2011/04/16-Security-Application-300x217.jpg" alt="" width="300" height="217" /></a>System admins know the importance of keeping up with operating systems patches on their workstations and servers, and making sure their antivirus definitions are kept up to date. We plan for and test regularly Microsoft’s monthly releases, and ensure 100% compliance on all our systems. But unless we’re using a commercial patch management solution, there are probably a myriad of third party applications that are installed on our workstations that are unfortunately not getting patched. Many of these applications are some of my favorites and I consider some of them to be ‘official’ applications for use on the network, but they don’t have their own central patch management capability, and cannot be managed using WSUS.</p>
<p><span id="more-3262"></span>Trying to manually update applications on more than a handful of systems is a Sisyphean task. Just as you get to the end of the process, more updates come out as new vulnerabilities are discovered, or bugs are squashed. Ignoring these applications is dangerous though, as many could become the source of a system compromise. Many do have their own automated method for checking for updates, but require the end user to acknowledge and install the update. These generally also require that the user have administrative rights to the operating system. Relying on end users to patch is neither practical, nor safe. Here are sixteen of the most popular applications that you might not be currently patching.</p>
<h2>Browsers</h2>
<p>Browsers can be especially dangerous to leave unpatched, as they are what users view websites with, and with their extensions, can include even more code that might inadvertently execute malware from a compromised site.</p>
<p><strong>1. Mozilla Firefox</strong><br />
Many users swear by Firefox, which also has a rich portfolio of extensions and plugins. Users can check for updates manually by clicking Help, Check for Updates.</p>
<p><strong>2. Google Chrome</strong><br />
Increasing in popularity, Google Chrome also has a growing number of plugins. Chrome checks for updates at each launch.</p>
<p><strong>3. Opera</strong><br />
Opera also checks for updates automatically, and will prompt the user to install them when a recommended update is available.</p>
<p><strong>4. Apple Safari</strong><br />
Apple’s Safari uses the Apple Software Update service to check for updates, and can be configured to install them automatically.</p>
<h2>Media</h2>
<p>Some may consider media players as not for business use, but between blended learning, content rich web based applications, and smart phone management, you will undoubtedly find most if not all of these on many workstations in your environment.</p>
<p><strong>5. Apple iTunes</strong><br />
Apple’s iTunes application is required for the initial setup and ongoing management of iPhones and iPads. As these devices permeate the corporate environment, keeping these applications up to date will become more and more important. Like Safari, iTunes uses the Apple Update Service to check for updates, but the user must download and install the latest version.</p>
<p><strong>6. Apple Quicktime</strong><br />
If you have iTunes, you have Quicktime, and just like iTunes, the Apple Update Service can check for updates, but the user must install them.</p>
<p><strong>7. Adobe Flash Player</strong><br />
Flash is almost the de facto format for content-rich websites, and dynamic content on web based applications. Flash will check for updates automatically, but again, the user must download and install the update. Corporate users can register to download a network redistributable package, but must work out how to install that on their own.</p>
<p><strong>8. Adobe Shockwave Player</strong><br />
Like Flash, Shockwave is frequently installed on laptops to access rich content on websites. It too has a redistributable package that can be deployed through a script.</p>
<p><strong>9. Real Player</strong><br />
Many corporate training solutions use Real Player to deliver required courses to all users. RealPlayer has an auto update feature which requires that the user have admin rights.</p>
<h2>Runtimes</h2>
<p>Runtimes provide great functionality for application development, but come with the risk that malicious applications can be downloaded and executed.</p>
<p><strong>10. Adobe Air</strong><br />
Adobe Air’s auto-update feature checks every two weeks to see if updates are available and then will prompt the user to install them. This requires that the user close any open Air apps, and that they have admin rights.</p>
<p><strong>11. Java Runtime Environment</strong><br />
The Java Runtime will also check periodically for updates, and prompts the user to download and install them. As with the others in this list, it requires the user to have administrative rights.</p>
<h2>Utilities</h2>
<p><strong>12. Adobe Reader</strong><br />
Adobe’s PDF Reader software is frequently updated. Current versions do check for updates and prompt the user to install them.</p>
<p><strong>13. BlackBerry Desktop Software</strong><br />
The management application for BlackBerries checks for updates when launched, and will prompt the user to download and install the latest version.</p>
<p><strong>14. 7-Zip</strong><br />
One of the two most common compression utilities, there is no setting in the program for automatically checking for updates.</p>
<p><strong>15. WinZip</strong><br />
The other of the two most common compression utilities, again, there is no setting in the program for automatically checking for updates.</p>
<p><strong>16. Pidgin</strong><br />
The Pidgin Instant Messaging application includes a plug-in called Release Notification that, when enabled, will check for updates and notify the user that they should download and install the latest version.</p>
<p>Fortunately, most of these (and many more) can be updated by commercial patch management software such as GFI LANguard. Others may require a manual install method like a login script or batch file. If you have these applications deployed on your network, make sure you are updating them on your workstations and servers.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/16-potentially-dangerous-applications-network/feed/</wfw:commentRss>
		<slash:comments>10</slash:comments>
		</item>
		<item>
		<title>How to repair PST files</title>
		<link>http://www.gfi.com/blog/pst-repair/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=pst-repair</link>
		<comments>http://www.gfi.com/blog/pst-repair/#comments</comments>
		<pubDate>Wed, 13 Apr 2011 17:58:01 +0000</pubDate>
		<dc:creator>Ed Fisher</dc:creator>
				<category><![CDATA[Headline]]></category>
		<category><![CDATA[Tech Zone]]></category>
		<category><![CDATA[email archiving]]></category>
		<category><![CDATA[email archiving software]]></category>
		<category><![CDATA[PST]]></category>
		<category><![CDATA[PST repair]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3226</guid>
		<description><![CDATA[One of the biggest problems users encounter when using PSTs is that they can corrupt. Because there are countless messages within a PST that could easily be lost when the file becomes corrupt, knowing how to repair PST files is &#8230;]]></description>
				<content:encoded><![CDATA[<p><a class="lightbox" title="repair PST files" href="http://www.gfi.com/blog/wp-content/uploads/2011/04/repair-PST-files.jpg"><img class="alignright size-medium wp-image-3227" style="margin: 10px; border: 0px solid black;" title="repair PST files" src="http://www.gfi.com/blog/wp-content/uploads/2011/04/repair-PST-files-300x200.jpg" alt="Repair PST files" width="300" height="200" /></a>One of the biggest problems users encounter when using PSTs is that they can corrupt. Because there are countless messages within a PST that could easily be lost when the file becomes corrupt, knowing how to repair PST files is highly important. Of course, it would be even better if you knew how to avoid the need to repair PST files in the first place.</p>
<p><span id="more-3226"></span></p>
<p>Let’s start with the initial point: what to do if you need to repair PST files. Here are three points:</p>
<h3>Inbox Repair Tool</h3>
<p>If you have a corrupt PST file, you will see this error message when you try to open it:</p>
<p>Errors have been detected in the file <em>&lt;file_path&gt;</em>. Quit all mail-enabled applications, and then use the Inbox Repair Tool.</p>
<p>Every current version of Outlook comes with a version of the Inbox Repair Tool called scanpst. Scanpst.exe can be found in either drive:\Program Files\Common Files\System\Mapi\LocaleID\scanpst.exe or drive:\Program Files\Microsoft Office\Office14 (Outlook 2010.) The scanpst.exe tool can scan a PST file for damage, and can recover it in many cases.</p>
<h3>OST Crop Tool</h3>
<p>When a PST has grown past its maximum supported size, the Inbox Repair Tool may not be able to repair it. If you run the scanpst. exe and it cannot repair the file, you may want to use the OST Crop Tool. This will not recover all of your email, but it will truncate the corrupt file down to a size that may be accessible. You can download that tool from <a href="http://www.microsoft.com/downloads/details.aspx?FamilyID=B33B1DFF-6F50-411D-BBDF-82019DDA602E&amp;displaylang=en">http://www.microsoft.com/downloads/details.aspx?FamilyID=B33B1DFF-6F50-411D-BBDF-82019DDA602E&amp;amp;displaylang=en</a></p>
<h3>Third party PST repair tools</h3>
<p>The market is full of PST repair tools from several third party sources. Some offer free versions, while others cost money up front. There are too many to list in this short article but a search on Google for ‘repair PST’ will serve you well. Read them carefully, and I strongly suggest making a copy of the PST to be repaired just in case, but that advice is good even if you are using the Microsoft tools above.</p>
<h3>But what if you didn’t have to worry about repairing PST files in the first place?</h3>
<p>Why do your users have PST files anyway? Is it because they have a small inbox limit, or is it because the system automatically deletes email over a certain age? Whatever the reason, knowing the problems that might arise, requiring PST repair and placing data at risk, is only half of the equation. You do need to provide an alternative and that is where email archiving software comes into play. A good email archiving software eliminates the need for PST files by creating an archive that can be accessed even when Exchange is offline, and that can provide virtually unlimited mailboxes. There are also tools like the PST Exporter that can transfer messages from PST files into the archive, ensuring ongoing access to email and eliminating the risk and performance impact from PSTs on the network.</p>
<p>Good email management includes maintaining access to email. Email archiving software is a great way to accomplish this, and can eliminate the risks and the headaches associated with PST repair.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/pst-repair/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
		<item>
		<title>Top 3 Patch Management Do’s and Don’ts</title>
		<link>http://www.gfi.com/blog/top-3-patch-management-dos-donts/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=top-3-patch-management-dos-donts</link>
		<comments>http://www.gfi.com/blog/top-3-patch-management-dos-donts/#comments</comments>
		<pubDate>Mon, 28 Mar 2011 17:41:11 +0000</pubDate>
		<dc:creator>Ed Fisher</dc:creator>
				<category><![CDATA[Tech Zone]]></category>
		<category><![CDATA[patch management]]></category>
		<category><![CDATA[security patches]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3208</guid>
		<description><![CDATA[A successful patch management process is a critical part of any network, no matter how many or how few systems you are maintaining. There are a few key things you should include to maximize the effectiveness of your patching process, &#8230;]]></description>
				<content:encoded><![CDATA[<p><a class="lightbox" title="updates button" href="http://www.gfi.com/blog/wp-content/uploads/2011/03/updates-button.jpg"><img class="alignright size-medium wp-image-3209" style="margin: 10px; border: 0px solid black;" title="updates button" alt="" src="http://www.gfi.com/blog/wp-content/uploads/2011/03/updates-button-300x200.jpg" width="300" height="200" /></a>A successful patch management process is a critical part of any network, no matter how many or how few systems you are maintaining. There are a few key things you should include to maximize the effectiveness of your patching process, and a few key things that can really cause you problems. Here are the top three in each category.</p>
<p><span id="more-3208"></span></p>
<h2>The top three Patch Management Do’s</h2>
<p>1)      <strong>Do deploy a system that can patch more than just the operating system</strong><br />
Consider all the third party apps and plugins, like PDF readers, media players and codecs, browser plugins, and more that are on all of your systems. Adobe, Apple, and others release patches several times a year, and many times these are in response to exploits already in the wild. Manually updating Flash on every workstation you have could cost more than the price of a patch management system, and you will need to update Flash more than once a year.</p>
<p>2)      <strong>Do test patches before deploying them</strong><br />
While every vendor does everything they can to test patches before releasing them to customers, it is impossible to test every single possible combination of software, configuration, and option that could be in the wild. Too many times has a patch been deployed, only to break a mission critical function. Have a set of test servers and workstations, and make sure you QA any patches before you deploy them. VMs that you can snapshot and revert are great for this.</p>
<p>3)      <strong>Do establish regular maintenance windows for patching</strong><br />
I once worked for an organization that needed the CIOs of seven different divisions to all agree on a maintenance window. If any one of the seven had something else to do on a planned maintenance weekend, the maintenance got postponed. It took a year before we could implement the upgrade that took less than an hour, because they would never approve a 2AM Sunday morning window because something else might be going on. The point is, patching must take priority, and having a regularly scheduled window that supersedes other concerns helps make sure you can get systems patched.</p>
<h2>The top three Patch Management Don’ts</h2>
<p>1)      <strong>Don’t assume you will hear about issues before they are a problem</strong></p>
<p>Subscribe your IT distribution list to the security advisories for every vendor you use. Add their RSS feeds to your reader. Follow security related accounts on Twitter. When a zero day exploit hits, you want to know about it ASAP.</p>
<p>2)      <strong>Don’t assume your systems are patched</strong></p>
<p>Whichever system you use, make sure you check the reports and verify that the patches you pushed were successfully deployed to all systems. Running security scans after that is another great way to confirm that all your systems were successfully updated. And don’t forget about those users who work remotely. They need to be patched too, and might not connect to your internal network often.</p>
<p>3)      <strong>Don’t use a solution that only patches the operating system</strong><br />
Setting every system to update automatically is better than nothing. Using WSUS helps you centralize your patching, and creates some great reports. And while the price is hard to beat, you get what you pay for. Patching only the operating system and Office products leaves many third party apps unpatched, and that may lead to a system to be exploited. This may sound a lot like the first DO, but it is that important, and worth repeating.</p>
<p>If you follow the first three points, and mind the last three, you are well on your way to deploying a successful patch management strategy that will help secure your systems, and your job.</p>
<p>If you want to implement a network security scanning and patch management tool, <a href="http://www.gfi.com/network-security-vulnerability-scanner?adv=13558&amp;loc=9" target="_blank">GFI LANguard</a> is your own ‘Virtual Security Consultant’. <a href="http://landlanss.gfi.com/network-scan-sm/?adv=13558&amp;loc=23" target="_blank">Download your free thirty-day trial</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/top-3-patch-management-dos-donts/feed/</wfw:commentRss>
		<slash:comments>4</slash:comments>
		</item>
		<item>
		<title>10 Tips for Successful Email Archiving</title>
		<link>http://www.gfi.com/blog/10-tips-successful-email-archiving/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=10-tips-successful-email-archiving</link>
		<comments>http://www.gfi.com/blog/10-tips-successful-email-archiving/#comments</comments>
		<pubDate>Mon, 28 Feb 2011 14:30:57 +0000</pubDate>
		<dc:creator>Ed Fisher</dc:creator>
				<category><![CDATA[Headline]]></category>
		<category><![CDATA[SMB Zone]]></category>
		<category><![CDATA[email archiving]]></category>
		<category><![CDATA[email storage]]></category>
		<category><![CDATA[PST files]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3154</guid>
		<description><![CDATA[While companies with unlimited storage, tiers of redundant servers, and high-speed WAN links may want to provide unlimited online storage for their users, the rest of us have to contend with budgets, hardware limitations, and bandwidth that is never enough. &#8230;]]></description>
				<content:encoded><![CDATA[<p><a class="lightbox" title="email archiving" href="http://www.gfi.com/blog/wp-content/uploads/2010/09/email-archiving.jpg"><img class="alignright size-medium wp-image-2909" style="margin: 10px; border: 0px solid black;" title="email archiving" src="http://www.gfi.com/blog/wp-content/uploads/2010/09/email-archiving-300x225.jpg" alt="" width="300" height="225" /></a>While companies with unlimited storage, tiers of redundant servers, and high-speed WAN links may want to provide unlimited online storage for their users, the rest of us have to contend with budgets, hardware limitations, and bandwidth that is never enough. Combine this with users’ tendencies to use PSTs, hard drives that crash, and the chance of receiving a subpoena, and you find that you need something between the limits of your small Exchange farm and the dream of unlimited online storage. Enter email archiving.</p>
<p><span id="more-3154"></span>Email archiving is a solution that offers great flexibility for the email admin. You can literally archive every single email in and out of your company if you wish, simply log things like sender, recipient, and subject, or anything in between. If you want to implement an email archiving solution, here are ten tips for ensuring you have all your bases covered.</p>
<ol>
<li><strong>Enable Auditing</strong><br />
Good email archiving solutions offer an auditing function that stores logs in a tamper proof fashion. If you are involved in a legal action, these logs can be submitted as evidence of the existence of, or the non-existence of, any particular email.</li>
<li><strong>Locate the archiving system at a central point</strong><br />
Small companies may have only one egress point, but larger companies may have a distributed network and site server that can send or receive email. Set up your archiving so that all mail is caught no matter which site is involved. Use SMTP routing queues if necessary to enforce this.</li>
<li><strong>Create sensible policies</strong><br />
Users will send and receive personal email. There isn’t anything wrong with that as long as your policies clearly define what is acceptable and what is not, and inform users that archiving is in use. You might also consider creating archiving rules that will archive all emails to or from client, partner, and vendor domains, but ignore emails from other domains.</li>
<li><strong>Consult with HR</strong><br />
Make sure you work with your Human Resources department when publishing your written  policies, to ensure you are in compliance with company policies, and that user notification is in place.</li>
<li><strong>Consult with Legal</strong><br />
Also involve your legal department (or corporate counsel) to make sure your archiving meets any contractual requirements or legal orders.</li>
<li><strong>Consult with Audit</strong><br />
Email archiving can factor into external audit reports for things like SAS70, or can be invoked into meeting requirements for Sarbanes-Oxley. Work with your auditors to take advantage of, and to make sure you are supporting, any requirements for certification or accreditation.</li>
<li><strong>Migrate existing PSTs into the archiving system</strong><br />
And then use a GPO to disable the ability to create PSTs. Not only do PSTs present the risk of lost data, they can severely impact network performance.</li>
<li><strong>Provide users easy access</strong><br />
Whether that is through a snap-in in Outlook, or a web based interface, make sure users have a ‘self-service’ option to search for and find archived emails and to recover deleted messages.</li>
<li><strong>Make sure the solution works in your environment</strong><br />
Appliances may be the right choice for some, but many companies are moving towards virtualisation. Whether that is with VMware or Microsoft’s Hyper-V, make sure your solution works with your platform of choice.</li>
<li><strong>Ensure there isn’t any way around the system</strong><br />
Audit and discovery are great, but if a user has a way to circumvent the archiving solution, that could bring the logs into question. Make sure the firewall blocks outbound SMTP from anything other than systems that are a part of the email infrastructure, and the proxies block access to personal webmail sites.</li>
</ol>
<p>With these ten tips, you have plenty to consider when evaluating email archiving.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/10-tips-successful-email-archiving/feed/</wfw:commentRss>
		<slash:comments>6</slash:comments>
		</item>
		<item>
		<title>6 Tips for a Successful Patching Process</title>
		<link>http://www.gfi.com/blog/6-tips-successful-patching-process/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=6-tips-successful-patching-process</link>
		<comments>http://www.gfi.com/blog/6-tips-successful-patching-process/#comments</comments>
		<pubDate>Thu, 27 Jan 2011 15:30:22 +0000</pubDate>
		<dc:creator>Ed Fisher</dc:creator>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Tech Zone]]></category>
		<category><![CDATA[patch management]]></category>
		<category><![CDATA[security patches]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3118</guid>
		<description><![CDATA[Whether your servers run Windows or Linux, whether your workstations are Windows 7 or Macs, and no matter what vendor your network gear comes from, one of the most critical administrative tasks for admins of any system is patching. With &#8230;]]></description>
				<content:encoded><![CDATA[<p><a class="lightbox" title="security patches" href="http://www.gfi.com/blog/wp-content/uploads/2011/01/security-patches.jpg"><img class="alignright size-medium wp-image-3119" style="margin: 10px;" title="security patches" src="http://www.gfi.com/blog/wp-content/uploads/2011/01/security-patches-300x205.jpg" alt="" width="300" height="205" /></a>Whether your servers run Windows or Linux, whether your workstations are Windows 7 or Macs, and no matter what vendor your network gear comes from, one of the most critical administrative tasks for admins of any system is patching.  With new vulnerabilities announced every week, and with dozens, if not hundreds of different applications running on your network, having an effective patch management process in place is critical to maintaining the health and security of your systems.</p>
<p><span id="more-3118"></span></p>
<h2>1.	Awareness</h2>
<p>When it comes to patching, one of the most important things for you to do is to be aware of what is out there. All the major vendors include mailing lists that you can subscribe to so that you receive notifications of patches. It won’t hurt to subscribe to some of the other mailing lists like those from SANS or Bugtraq that let you know when there are vulnerabilities, even when patches aren’t released yet. Subscribe your IT or security team’s distribution list to make sure nothing is missed while someone is on vacation. See the end of this post for links to some of the major mailing lists.</p>
<h2>2.	Include applications</h2>
<p>A growing number of exploits take advantage of applications that open or execute file types. Windows Update can take care of your operating system and Microsoft applications, but almost every computer on your network will have third-party applications, including PDF readers, media players, and other line of business applications. Make sure you stay informed of patches for all the applications that are a part of your image.</p>
<h2>3.	Test before you deploy</h2>
<p>All vendors test their patches before releasing them, but it is virtually impossible for a vendor to test every possible combination of hardware, application, and driver, and they cannot test your proprietary applications developed internally. Have a set of machines that you deploy patches to first and test to make sure you don’t introduce any problems to your systems. Take advantage of virtualisation technologies when you can, or use your IT department and secondary servers if you have to, but make sure you test all patches before you roll them out to the entire organization, or to key servers.</p>
<h2>4.	Schedule maintenance windows</h2>
<p>Patching requires time, bandwidth, and reboots, and all of these can interrupt normal processes. Even companies that run their business 24&#215;7 need to have some established maintenance windows for normal patching, and a process in place to push emergency patches in the event of a zero-day exploit. By having a scheduled maintenance window, business operations can plan around, or at least be prepared for, potential disruptions when key systems reboot after patching.</p>
<h2>5.	Use a patch management system</h2>
<p>Manual patching is time and labor intensive, error prone, and impossible to report upon. There are several excellent low cost patching systems on the market that can push patches, audit systems, and generate reports for management and security assessments.</p>
<h2>6.	Include a roll-back plan</h2>
<p>No matter how much vendors test their patches, and how thoroughly you test your systems, there may come a time when a patch causes an issue, and you will need to roll it back. Make sure that when you push patches, everyone is aware, and if problems crop up after deployment, be prepared to first check those patches to see if they are a possible cause, and to uninstall them if necessary.  With these six concepts at the foundation of your patching plan, you are well on your way to making patching a routine part of your administration, instead of a painful process that causes disruptions to the network.  Here’s a list of mailing lists that you may want to subscribe to so as to always be up-to-date:</p>
<ul>
<li><a href="http://www.sans.org/newsletters/" target="_blank">http://www.sans.org/newsletters/</a> &#8211; Subscribe to the SANS Institute newletters</li>
<li><a href="http://technet.microsoft.com/en-us/security/cc307424.aspx" target="_blank">http://technet.microsoft.com/en-us/security/cc307424.aspx</a> &#8211; Register to receive Microsoft’s security newsletter</li>
<li><a href="http://technet.microsoft.com/en-us/security/dd252948.aspx" target="_blank">http://technet.microsoft.com/en-us/security/dd252948.aspx</a> &#8211; Register to receive Microsoft Technical Security Notifications</li>
<li><a href="http://www.us-cert.gov/cas/signup.html" target="_blank">http://www.us-cert.gov/cas/signup.html</a> &#8211; CERT Mailing Lists and Feeds</li>
<li><a href="http://seclists.org/bugtraq/" target="_blank">http://seclists.org/bugtraq/</a> &#8211; Bugtraq Mailing List</li>
<li><a href="http://seclists.org/" target="_blank">http://seclists.org/</a> &#8211; SecLists.Org Security Mailing List Archive</li>
<li><a href="http://www.linux-sec.net/ML_FAQS/" target="_blank">http://www.linux-sec.net/ML_FAQS/</a> &#8211; Mailing lists for specific Linux/Unix distros</li>
<li><a href="http://lists.apple.com/mailman/listinfo/security-announce" target="_blank">http://lists.apple.com/mailman/listinfo/security-announce</a> &#8211; Apple Security Mailing List</li>
</ul>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/6-tips-successful-patching-process/feed/</wfw:commentRss>
		<slash:comments>3</slash:comments>
		</item>
		<item>
		<title>5 Popular Hacking Techniques – Do you know your enemies? (Part 2)</title>
		<link>http://www.gfi.com/blog/5-popular-hacking-techniques-enemies-part-2/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=5-popular-hacking-techniques-enemies-part-2</link>
		<comments>http://www.gfi.com/blog/5-popular-hacking-techniques-enemies-part-2/#comments</comments>
		<pubDate>Tue, 30 Nov 2010 14:00:53 +0000</pubDate>
		<dc:creator>Ed Fisher</dc:creator>
				<category><![CDATA[Tech Zone]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[network scanning]]></category>
		<category><![CDATA[social engineering]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3043</guid>
		<description><![CDATA[Welcome back. In part one, we explained the importance of understanding the threats against your network and looked at three common hacking techniques that the bad guys might use against you. They included Attacking Defaults, SQL Injection, and Exploiting Unpatched &#8230;]]></description>
				<content:encoded><![CDATA[<p><a class="lightbox" title="hacking" href="http://www.gfi.com/blog/wp-content/uploads/2010/11/hacking.jpg"><img class="alignright size-medium wp-image-3041" style="margin: 10px;" title="hacking" src="http://www.gfi.com/blog/wp-content/uploads/2010/11/hacking-199x300.jpg" alt="" width="199" height="300" /></a>Welcome back. In part one, we explained <a href="http://www.gfi.com/blog/5-popular-hacking-techniques-enemies" target="_blank">the importance of understanding the threats against your network and looked at three common hacking techniques that the bad guys might use against you</a>. They included Attacking Defaults, SQL Injection, and Exploiting Unpatched Services. Now, let’s look at two more, and finish up with some good advice.</p>
<p><span id="more-3043"></span></p>
<h2>4. Network Scanning</h2>
<p>There are several million systems on the Internet, so you may be asking yourself why any hacker would try to break into your network? Often, the answer is as simple as ‘because they can’. No matter how small your network is, or how limited your perceived scope may be, network scanners can probe millions of connected systems in hours, and do so in a completely automatic way that could be running while the attacker is at work, or out on the town, or even asleep.</p>
<p>Ping sweeps are used to see if a host is connected to the network, and can be combined with, or followed by port scanners. These tools will probe your connected hosts to see what type of operating system they use, what services they are running, and their output can then be fed into more sophisticated attacks against the specific versions your systems are running.</p>
<p>Defend your systems by using a firewall to block access to unapproved services, change your default banners, and as previously mentioned, keep up with your patches. Consider implementing Intrusion Detection Systems that can alert you when your network is being scanned, or the more advanced Intrusion Prevention Systems, that can automatically respond to such scans by slowing down responses or dynamically blocking the offending system.</p>
<h2>5. Social Engineering</h2>
<p>A chain is only as strong as its weakest link, and unfortunately, your network security chain’s weakest link is usually going to be its users. Social engineering attacks look to take advantage of people’s natural tendencies to trust others, to respect authority, to be helpful, and to do things that offer them advantage. Phishing emails induce users to click on links to websites and submit personal information by tricking users into thinking they are on a trusted site. Other emails or instant messages can appear to come from a contact or respected company and contain links to download software or view a website, which, when doing so, introduces malware including key loggers, remote access Trojans, and viruses. The more brazen social attacker may just call up a user while pretending to be the helpdesk, convincing them to give out their username and password; or they may call the helpdesk and pretend to be a senior lead of the company, requesting that their credentials be reset. These are all events that happen to networks across the globe daily.</p>
<p>Here, your defence in depth includes making sure you have security and acceptable use policies that are shared with and understood by your users; that you maintain strong anti-virus software on all desktops and servers; that you scan all inbound and outbound email for malware, phishing links, and sensitive information; and by ensuring that your IT staff does not do anything that encourages users to violate policy, like asking users for their password to fix a problem.</p>
<p>Remember that security is an ongoing process, not a goal. Every day, new challenges arise, new systems and software are added to your network, and new vulnerabilities are discovered in operating systems and applications. By following best practices, keeping up with developments in information security, and subscribing to the security alert notifications from your vendors, you are well on your way to maintaining a secure network. Always change default credentials on every system that connects to your network. Sanitize any input your applications allow. Keep up with patches for all operating systems and applications. Use firewalls and intrusion defense. Maintain good policies and educate your users on how they are responsible for network security too.</p>
<p><em><strong>About the Author:</strong> Ed Fisher is an information systems manager and blogger at several sites including his own site, <a href="http://retrohack.com" target="_blank">http://retrohack.com</a>. An InfoTech professional, aficionado of capsaicin, and Coffea canephora (but not together,) he has been getting my geek on full-time since 1993, and has worked with information technology in some capacity since 1986. Stated simply, if you need to get information securely from point A to B, he’s your guy. He is like &#8220;The Transporter,&#8221; but for data, and without the car; and with a little more hair.</em></p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/5-popular-hacking-techniques-enemies-part-2/feed/</wfw:commentRss>
		<slash:comments>5</slash:comments>
		</item>
		<item>
		<title>5 Popular Hacking Techniques – Do you know your enemies?</title>
		<link>http://www.gfi.com/blog/5-popular-hacking-techniques-enemies/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=5-popular-hacking-techniques-enemies</link>
		<comments>http://www.gfi.com/blog/5-popular-hacking-techniques-enemies/#comments</comments>
		<pubDate>Mon, 29 Nov 2010 12:58:50 +0000</pubDate>
		<dc:creator>Ed Fisher</dc:creator>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Tech Zone]]></category>
		<category><![CDATA[exploits]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[SQL Injection]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3040</guid>
		<description><![CDATA[“Know your enemy and know yourself and you can fight a hundred battles without disaster.” &#8211; Sun Tzu While the famous Chinese general may not have had hacking techniques in mind when he penned The Art of War some 2500 &#8230;]]></description>
				<content:encoded><![CDATA[<p style="text-align: center;"><a class="lightbox" title="hacking" href="http://www.gfi.com/blog/wp-content/uploads/2010/11/hacking.jpg"><img class="alignright size-medium wp-image-3041" style="margin: 10px;" title="hacking" src="http://www.gfi.com/blog/wp-content/uploads/2010/11/hacking-199x300.jpg" alt="" width="199" height="300" /></a><em>“Know your enemy and know yourself and you can fight a hundred battles without disaster.”</em> &#8211; Sun Tzu</p>
<p>While the famous Chinese general may not have had hacking techniques in mind when he penned <em><a href="http://classics.mit.edu/Tzu/artwar.html" target="_blank">The Art of War</a></em> some 2500 years ago, there is great merit in knowing your enemy, and the techniques s/he may use against you. If you are a network administrator, a critical part of your job is defending your systems. Knowing what these attacks are, and how to defend against them, will help immensely with the task of protecting your information systems from harm. While there are thousands of potential attacks, and many books and countless websites that cover them to the tiniest detail, the following five general categories can help you defend against the lion’s share of threats facing your systems.</p>
<p><span id="more-3040"></span></p>
<h2>1.	Attacking Defaults</h2>
<p>These days, essentially every piece of hardware and network application on the market comes with a set of default credentials; a username and a password that grant administrative access to the system. One of the most common ways of gaining unauthorised access to a system is by exploiting the fact that often, admins do not know, or do not care to change, these defaults.</p>
<p>Whether we are talking about a database application, a router, or a printer, defending against these attacks is simple. The first thing you should do when connecting a system to your network or installing an application on a server is to change the default credentials.</p>
<h2>2.	SQL Injection</h2>
<p>Arguably one of the most devastating attacks against web based systems is the SQL Injection attack. Today’s dynamic websites often comprise much more than just a web server serving html code and graphics files to users. Ecommerce sites use database servers to host the backend information that is used to build interactive sites, present product information, and take orders. Even some of the most simplistic seeming websites may have a database on the backend. If the site provides a way for users to log on, or to submit information, you can bet there is a database behind the scenes.</p>
<p>SQL Injection attacks are when an attacker inputs SQL commands into the fields meant for other information, like usernames or search strings. A properly designed website will examine any data submitted by a user to make sure that the information is valid. A username typically will contain only letters; an email address might have letters and numbers, but only a few metacharacters like @, ., -, and +. If this input contains something a simple as a single quote ‘ sign at the end of the username, it could be interpreted by the database application as constructed SQL, and interpreted as a query. While it may not be a valid query, the database server may return an error that exposes information like the name of the database, its tables, and key fields. Continuing down this path, an attacker could submit SQL commands into the username field that could be executed to return the contents of the database, or to do things like drop tables.</p>
<p>To defend against this attack, your web applications must evaluate all submitted data for input that does not contain expected and allowed characters. Whether your application sanitizes user input by removing invalid characters, escaping any SQL specific characters before passing input to the database, or rejects it with a message back to the user asking them to try again using only allowed characters, it must act as the first line of defense to ensure that no commands can be passed to the database. Remember, even a command that fails, if executed by the database server, may reveal more information to the attacker that will make the next attack more effective.</p>
<h2>3.	Exploiting Unpatched Services</h2>
<p>I have been in the information security field since 1997, and have been a CISSP since 2003. Of all the hundreds of security incidents I have been involved in, whether on behalf of an employer or for a client, I can still count on my two hands the number of intrusions that have <em>not</em> been the result of an attacker taking advantage of an unpatched system. Patching is time consuming, often difficult, and can sometimes introduce problems even as it is trying to prevent others, but the fact remains that you must patch your systems. Every operating system, whether it is installed on a computer or embedded as firmware on a piece of networking equipment, and every application your users run, has flaws. They were all written by humans, and mistakes were made. As these flaws are uncovered, updated code is released by the manufacturer to correct these issues, hopefully before a bad guy uses these flaws to exploit a system.</p>
<p>As an administrator, you must keep up with these patches, testing them as necessary, and deploying them to all networked systems. As operating systems and applications age, and fall out of support, you need to budget the necessary time and resources to update/upgrade these systems. Just because a vendor no longer issues updates for a system does not mean that there are no more security issues to be discovered.</p>
<p>The bad guys may frequently use any or all of the three hacking techniques we just covered, but there are still more you need to be prepared against. In the second part of this series, we’ll look at two more common hacking methods that you will be up against, and summarize some best practices to help you defend against them all.</p>
<p><em><strong>About the Author:</strong> Ed Fisher is an information systems manager and blogger at several sites including his own site, <a href="http://retrohack.com" target="_blank">http://retrohack.com</a>. An InfoTech professional, aficionado of capsaicin, and Coffea canephora (but not together,) he has been getting my geek on full-time since 1993, and has worked with information technology in some capacity since 1986. Stated simply, if you need to get information securely from point A to B, he’s your guy. He is like &#8220;The Transporter,&#8221; but for data, and without the car; and with a little more hair.</em></p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/5-popular-hacking-techniques-enemies/feed/</wfw:commentRss>
		<slash:comments>7</slash:comments>
		</item>
	</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

 Served from: www.gfi.com @ 2013-08-12 14:24:03 by W3 Total Cache --