Author Archives: Emmanuel Carabott
Troubleshooting a Blue Screen
One of the most annoying things that can happen to an administrator is when at random intervals a PC crashes and generates a so-called blue screen of death. A blue screen can be caused by a number of faults and it …
6 Features for Good Internet Traffic Monitoring
If you asked an employee what they understood by ‘monitoring Internet traffic’, they would probably say it is a simple process which is meant to ensure users do not access websites that they are not meant to visit on the …
Top 37 Risks Businesses Run with Uncontrolled Internet Usage
No one in IT really wants to be the Internet Police – granted. In fact, the less we know about our colleagues’ web surfing habits, the happier we will probably be. Sometimes there really is such a thing as ‘too …
Network Internet Control – Managing Risk the Right Way
The first thing that comes to mind when discussing network Internet control is usually how the administrator can make sure that users are visiting legitimate websites. Secondly, most administrators would be running regular virus scans of any file(s) downloaded from …
The 43 Things Administrators Should Never Do
Administrators have a tough job on their hands to manage, maintain and protect the network they are responsible for. Armed with the latest tools, they do an excellent job; however, at times, often due to pressure, they make mistakes – …
Defending Against Zero-Day Threats
Zero-day threats are attacks that use an unknown exploit/attack for which no patch or antivirus definition file exists as yet, and they are a major concern for administrators. So what can an administrator do to prevent zero-day attacks from affecting …
57 Tips Every Admin Should Know
The longer a person serves as a network admin, the more tips and tricks they are likely to pick up along the way. Some could be shortcuts, others might seem like magic, but all are intended to save you time …
Hacking Motivations – Hacktivism
Hacktivism is a term which describes the use of hacking for political, non-violent activism. As with any other form of activism, people’s perceptions will differ; some see hacktivism as a necessary tool against oppression, while others see it as nothing …
The Stuxnet malware story
I came across an excellent story by Ars Technica on the Stuxnet malware. It’s well worth the read as it goes into detail on how the virus originated, how it was analyzed and how security researchers got to the bottom …
How hard is it to get robbed?
There are a number of software products that can help you protect your network from both internal and external attacks. Protecting the network with these tools is, relatively speaking, the easy part. The hard part is to design security policies …










