Author Archives: Mohammed S Ali
Beware the Malware Banner
Have you already heard about the banner trick? Not yet? This is one of the latest sophisticated additions found in the Zeus malware configuration. This addition has been recently discovered, analyzed and reported by Trusteer. Malware such as Zeus place …
Tips for a Good Patch Management Strategy
Previously “Never touch a running system” was a very common tradition/saying in IT administration. Once software is installed on a system, it will be never touched again as long as software does the job properly. Nowadays, this common tradition has …
How to Detect Network Intruders (Part 2)
In the previous blog post we saw how identity theft in a corporate environment can be a huge risk for a corporate environment and how the possible injection of malicious code can easily take place and go unnoticed on a client …
How to Detect Network Intruders (Part 1)
Stealing someone’s identify is one of the best known techniques for hackers to access confidential information in a corporate environment. But how does it work? Why is it difficult to detect such intrusion attempts? What can be done to safeguard your …
How End Point Security Software Can Prevent Data Theft
Data thefts in corporate environments happen quite often although many of them remain unnoticed for a long time. Small and medium sized organizations are usually the most badly affected, especially when no security measurements are in place within the IT …
4 Reasons for Implementing Patch Management Software
Patching is a very common term in IT system administration. So what are patches for and how important are they for IT security? Generally patches are software updates which fix certain bugs in the software. Nowadays theses patches also contain …
How Events Monitoring can Prevent IT Disasters (Part 3)
In this last blog post of this series I’ll provide a real example which explains how a server can be monitored efficiently with events monitoring. Let us say that there are three main applications (a mail server, a database management …
How Events Monitoring can Prevent IT Disasters (Part 2)
In the first part of this blog post we saw how events monitoring can be a very powerful, effective and at the same time affordable means to prevent system failures in a corporate environment. I believe that the process of …
How Events Monitoring can Prevent IT Disasters (Part 1)
An IT disaster in a corporate environment may cause a significant loss of money and may also interrupt business relevant processes during production. Data loss is one of the worst parts of an IT disaster which sometimes may not be …
Why FAX is still an essential element in corporate environments
Germany is one of the leading countries where fax software in general has been established successfully and is still recognized as essential equipment for running a corporate business. Sending a fax is easy, fast and very cheap. But the great …










