Are you prepared for Microsoft Forefront’s EOL?

Microsoft Forefront will be discontinued. Instead, Microsoft has launched a new product line called Exchange Online Protection. Can existing Microsoft Forefront Protection customers simply migrate to the new Exchange Online Protection solution?

Continue reading

Are vulnerabilities really a risk or simply hype?

Vulnerabilities are the talk of the town lately but you sometimes wonder ‘is there really any substance to these reports, or it is hype?’ With networks running AV and hardened firewalls in place, surely vulnerabilities cannot have that much of an effect… or can they?

Continue reading

How to solve Windows Firewall Error Code 0×80070424

Windows Firewall Error Code 0×80070424 may indicate a problem with the Windows Module Installer. Here’s how to fix it.

Continue reading

The 13 most important skills for sysadmins to develop

We’ve collected a list of the skills that are most important to sysadmins, no matter what their specific focus is – check it out!

Continue reading

How to export and import mailboxes with Exchange

Whether you are trying to make a backup for a departing employee, to respond to a discovery motion or a compliance request, or you are trying to import data into a test environment, you may from time to time need to either import data from a PST into a mailbox or export a mailbox to […]

Continue reading

How to simplify vulnerability assessment on network devices [Infographic]

When we talk about vulnerability assessments, we most like think of operating systems, applications, laptops, workstations and servers, yet network devices are often overlooked. And that could become a problem. That is why it’s important to have a tool which scans your network and does a full vulnerability assessment of all your software and hardware. […]

Continue reading

The Spy Storm

I am very careful when writing about security. There is a fine line between an objective discussion on security and engaging in what we often term “FUD” – fear, uncertainty and doubt.

Continue reading

How to Avoid Becoming the Villain (Part 2)

Life is full of surprises. I recently wrote an article titled How to Avoid Becoming the Villain on why it is so important to configure your servers correctly so that people cannot exploit them for illegal purposes. A few days ago, I came across a case that adds weight to the points I made then.

Continue reading

Education is Your Only Defence against Shoulder Surfing

All the technology products in the world will never protect you against shoulder surfing. Shoulder surfing occurs when someone overhears or sees another person entering their credentials into a system and learns what they are. It has happened to most of us and shoulder surfing can be either accidental – you  happen to be next […]

Continue reading

The Hidden Security Threat

Although not all stories in the tech press are directly related to security, they often highlight issues that can be excellent educational material. A recent story in The Register about a researcher who wanted to map the Internet caught my attention. The researcher had a Herculean task to complete: to scan billions of IP addresses […]

Continue reading