Follow GFI:
Find us on Facebook Follow us on Twitter Find us on Linkedin Subscribe to our RSS Feed Find us on YouTube Find us on Google+
 

Author Archives: Emmanuel Carabott

Are you providing security for your customers?

Are you providing security for your customers?

on December 21, 2010

Security should not be considered exclusively within the context of one’s organization and environment, it is also important to consider your customers’ access to your systems. We all take things for granted and sometimes do not realise certain shortcomings until …

Read the Full Story
8
Why can’t I access the DSN I just created?

Why can’t I access the DSN I just created?

on December 20, 2010

The switch to 64 bit was an essential step for computing; however, the bliss of having the extra addressing space was not all that we got unfortunately. The mixture of 32 bit and 64 bit environments has been a source …

Read the Full Story
1
Why being Proactive in Security is Essential

Why being Proactive in Security is Essential

on December 9, 2010

We have always been taught that once your system is compromised you need to either restore a clean backup or re-install the system in order to be safe. This is because the person who compromised the machine might have installed …

Read the Full Story
7
8 Steps to Securing a Public Machine

8 Steps to Securing a Public Machine

on November 23, 2010

Mohammed S Ali, wrote an interesting article about the dangers of using public PCs, so to continue with the topic I’ll be explaining what you need to do to secure a machine for public use. 1. Physical Security The first …

Read the Full Story
5
Why Security Policies Cannot Stand Alone

Why Security Policies Cannot Stand Alone

on November 18, 2010

One important tool in security is without a doubt an effective security policy. A security policy helps to ensure that common procedures across the organization are followed thus facilitating the identification of risks and mitigation of said risks as well …

Read the Full Story
4
Cyber Warfare – Fear is the Real Threat

Cyber Warfare – Fear is the Real Threat

on November 16, 2010

Lately cyber warfare has become a popular phrase. I’ve come across reports and news items stressing the importance of protecting ourselves against this vicious threat; however, such coined phrases often make the situation sound worse than it is.

Read the Full Story
13
Best Practices for Patch Management

Best Practices for Patch Management

on November 1, 2010

The first item on an administrator’s to-do list is generally patch management. If done incorrectly patch management can be a risk for the organization instead of a risk mitigator. A few simple best practices however easily eliminate all of these …

Read the Full Story
5
7 Ways to Monitor your Local Network

7 Ways to Monitor your Local Network

on October 27, 2010

Just as with the internet there is plenty to monitor on your local network too. An effective monitoring system can greatly enhance the security of your network by detecting issues before malicious attackers have time to exploit them and by …

Read the Full Story
7
A Look into Insidious Threats – The Logical Bomb

A Look into Insidious Threats – The Logical Bomb

on September 22, 2010

Insidious Threats – Logical Bomb (Emmanuel Carabott) When we think of security we generally get a mental picture of a war against viruses and hackers.  The reason for this is that these are by far the most common threats an …

Read the Full Story
4
How to create a very strong password

How to create a very strong password

on September 15, 2010

Researchers call for stronger passwords An article on the BBC recently called for people to use stronger passwords in the wake of more computational power available to hackers. We know that security needs to scale as computers become more powerful …

Read the Full Story
15