<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Talk Tech To Me - GFI Blog &#187; Nicholas Sciberras</title>
	<atom:link href="http://www.gfi.com/blog/author/nicholas-sciberras/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.gfi.com/blog</link>
	<description>Brought to you by GFI Software</description>
	<lastBuildDate>Fri, 13 Sep 2013 16:51:58 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
		<item>
		<title>Is Spam a form of Marketing/Advertising?</title>
		<link>http://www.gfi.com/blog/spam-form-marketingadvertising/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=spam-form-marketingadvertising</link>
		<comments>http://www.gfi.com/blog/spam-form-marketingadvertising/#comments</comments>
		<pubDate>Fri, 15 Apr 2011 15:05:34 +0000</pubDate>
		<dc:creator>Nicholas Sciberras</dc:creator>
				<category><![CDATA[SMB Zone]]></category>
		<category><![CDATA[email marketing]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[spam]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3224</guid>
		<description><![CDATA[Arguably, spam forms part of the email marketing tool used by marketers for direct advertising.  We never asked for or subscribed to most marketing messages that we receive on a daily basis. So how is spam different? Let’s first take &#8230;]]></description>
				<content:encoded><![CDATA[<p><a class="lightbox" title="no more spam" href="http://www.gfi.com/blog/wp-content/uploads/2011/04/no-more-spam.jpg"><img class="alignright size-medium wp-image-3225" style="margin: 10px; border: 0px solid black;" title="no more spam" src="http://www.gfi.com/blog/wp-content/uploads/2011/04/no-more-spam-300x199.jpg" alt="" width="300" height="199" /></a>Arguably, spam forms part of the email marketing tool used by marketers for direct advertising.  We never asked for or subscribed to most marketing messages that we receive on a daily basis. So how is spam different? Let’s first take a quick look at the predecessors of spam – techniques that marketers have used and are still using – some of which have been over abused and are thus illegal or restricted.</p>
<p>Advertising mail is probably the first type of direct marketing used to sell a product directly to the consumer. It was also the first to be termed Junk mail, since it was over abused by marketers, and people started seeing it as a nuisance.</p>
<p><span id="more-3224"></span>Advertisements are found in newspapers and magazines mixed up with interesting articles where the ratio of articles to advertisements varies depending on the publication, with some publications having a section for adverts, whereas others having articles hiding a discreet marketing message.</p>
<p>Radio and TV commercials are another nuisance that we have to endure on a daily basis. Some stations are dedicated to simply selling stuff, whereas others mix their ads into the mix of Indiana Jones movies, CSI TV series and Jerry Springer talk shows.</p>
<p>There are other similar techniques used to promote a product or brand. These include door to door leaflet delivery, broadcast faxing, cold calling aka telemarketing, voicemail marketing and last but not least billboards.</p>
<p>While writing this article, I recalled the frustration I felt every time my Rambo film was paused in the middle of the action or the countless ad pages I have to lead through in a newspaper to get to the Sports section at the end. But at the same time, we are tolerant to such marketing content. However we treat spam very differently – we do our best to stop that. Why do we need to subscribe in order to receive spam? I never subscribed to the billboards on the side of the highway.</p>
<p>Compared to all the marketing techniques described above, email marketing is the cheapest way of sending a marketing message to millions of people. Being so cheap, it is the tool of choice for marketing teams with a small budget trying to sell cheap products. Most of the times, such products do not deliver what they promise.</p>
<p>Most of the marketing techniques described above deliver something useful. This is true for newspapers, magazines, TV and radio. These media would not be free, or would be much more expensive had it not been for the ads.</p>
<p>Unfortunately with email marketing, you run the risk of being exposed to malware and fraudulent emails. Worms and viruses often make use of email and spam techniques to propagate. Phishing emails and Nigerian 419 scams are examples of fraudulent emails which try to harvest either your money or your personal information including credit card details.</p>
<p>Similar to junk mail received at your home mailbox, spam frequently gets mixed up with emails from friends, colleagues, and bosses. And probably this is the thing that we hate most about spam – the fact that it is sometimes difficult to distinguish a legitimate email from a spam email at first glance.</p>
<p>So while email marketing is the tool of choice for most marketing teams, it does require stringent regulations to ensure that it does not get abused. Some countries have updated their regulations to cover spam, but others still have to catch up. In any case, regulations are not stopping cheap email marketers and fraudulent emails and until that happens, it is wise to make use of a good anti-spam product.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/spam-form-marketingadvertising/feed/</wfw:commentRss>
		<slash:comments>5</slash:comments>
		</item>
		<item>
		<title>How to remove hidden network adapters from virtual machines</title>
		<link>http://www.gfi.com/blog/how-to-remove-hidden-network-adapters-from-virtual-machines/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=how-to-remove-hidden-network-adapters-from-virtual-machines</link>
		<comments>http://www.gfi.com/blog/how-to-remove-hidden-network-adapters-from-virtual-machines/#comments</comments>
		<pubDate>Wed, 04 Aug 2010 12:18:32 +0000</pubDate>
		<dc:creator>Nicholas Sciberras</dc:creator>
				<category><![CDATA[Tech Zone]]></category>
		<category><![CDATA[network management]]></category>
		<category><![CDATA[virtual machines]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=2755</guid>
		<description><![CDATA[When using virtualization on a Microsoft environment such as Hyper-V you can easily have network problems when restoring a Virtual hard drive or changing a network card. With some operating systems on Hyper-V you may notice that the network adapter &#8230;]]></description>
				<content:encoded><![CDATA[<p><a class="lightbox" title="Lan interface" href="http://www.gfi.com/blog/wp-content/uploads/2010/07/Lan-interface.jpg"><img class="alignright size-medium wp-image-2756" style="margin: 10px;" title="Lan interface" src="http://www.gfi.com/blog/wp-content/uploads/2010/07/Lan-interface-300x199.jpg" alt="" width="300" height="199" /></a>When using virtualization on a Microsoft environment such as Hyper-V you can easily have network problems when restoring a Virtual hard drive or changing a network card. With some operating systems on Hyper-V you may notice that the network adapter “MS Virtual Machine Bus Network Adapter” name changes and a number is associated with it, example “MS Virtual Machine Bus Network Adapter #3”.</p>
<p><span id="more-2755"></span></p>
<p>This happens when you load an image from your backup. This will sometime cause network connectivity issues, due to the fact that other network adapters will still be configured (hidden) in the device manager which still lock your IP address. This will also cause the issue whereby although you configure the current network adapter (as seen in the Device Manager), no network activity can be achieved. Unfortunately these devices will not show directly in your device manager, so the following steps must be taken.</p>
<p>This can easily be removed by opening the command prompt with administrative access and typing the following command:</p>
<blockquote><p><span style="font-family: Consolas, Monaco, 'Courier New', Courier, monospace; line-height: 18px; font-size: 12px; white-space: pre;">set devmgr_show_nonpresent_devices=1<br />
</span><span style="font-family: Consolas, Monaco, 'Courier New', Courier, monospace; line-height: 18px; font-size: 12px; white-space: pre;">start devmgmt.msc</span></p></blockquote>
<p>This will start the Device Manager. It is important to start the Device Manager from the same command prompt, since it will lose the setting to show the non present devices. If you open the Device Manager from the Control panel, the hidden devices will not show.</p>
<p>When the Device Manager loads, from the File menu, expand the View and select the Show Hidden Devices option. This will enable and show any old un-used devices in the window. From here, expand the Network Adapters node and you can right click on the devices which are extra and delete them accordingly.</p>
<p>Another method which can be used to identify the hidden devices is a free tool from Microsoft called ‘devcon’ which is a command line alternative to the Device Manager, but it will not work since it only removes present devices. Maybe Microsoft will be adding this feature in the future releases of the tool, but for now, although it will show hidden devices, it is not capable of removing them. It will give an error saying ‘Remove failed. No devices removed.’</p>
<p>After this is done, your network adapter will be free and you can set up the correct network settings. This method of hidden device removal can be used for any type of device. Since this option may come in handy in your daily job, it would be best to configure the setting to show non-present devices in the Environment Variables from the system properties so that every time the server is loaded, the setting will be automatically configured and you will be able to see the hidden devices without running through the above commands. This can be set by clicking the New button in the System Variables frame and in the variable name enter<span style="font-family: Consolas, Monaco, 'Courier New', Courier, monospace; line-height: 18px; font-size: 12px; white-space: pre;"> &#8216;devmgr_show_nonpresent_devices&#8217;</span>and in the variable value enter ‘1’.</p>
<pre>
<div id="_mcePaste" style="position: absolute; left: -10000px; top: 0px; width: 1px; height: 1px; overflow-x: hidden; overflow-y: hidden;">After this is done, your network adapter will be free and you can set up the correct network settings. This method of hidden device removal can be used for any type of device. Since this option may come in handy in your daily job, it would be best to configure the setting to show non-present devices in the Environment Variables from the system properties so that every time the server is loaded, the setting will be automatically configured and you will be able to see the hidden devices without running through the above commands. This can be set by clicking the New button in the System Variables frame and in the variable name enter ’devmgr_show_nonpresent_devices’, and in the variable value enter ‘1’.</div></pre>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/how-to-remove-hidden-network-adapters-from-virtual-machines/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
		<item>
		<title>GFI MailEssentials and Sender Policy Framework (SPF) – what is it and how does it work? (Part 2)</title>
		<link>http://www.gfi.com/blog/gfi-mailessentials-sender-policy-framework-spf-work-part-2/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=gfi-mailessentials-sender-policy-framework-spf-work-part-2</link>
		<comments>http://www.gfi.com/blog/gfi-mailessentials-sender-policy-framework-spf-work-part-2/#comments</comments>
		<pubDate>Mon, 15 Jun 2009 10:00:39 +0000</pubDate>
		<dc:creator>Nicholas Sciberras</dc:creator>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[GFI Fixes It]]></category>
		<category><![CDATA[dns]]></category>
		<category><![CDATA[sender policy frameworks]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=172</guid>
		<description><![CDATA[In Part 1 of this post we examined how SPF works. Now we&#8217;ll go into how to create and publish SPF records. Creating an SPF record for your domain The procedure outlined below can be divided into several stages: Determine &#8230;]]></description>
				<content:encoded><![CDATA[<p><img class="alignright size-medium wp-image-225" style="margin: 10px;" title="GFI MailEssentials and Send Policy Framework(2)" src="http://www.gfi.com/blog/wp-content/uploads/2009/06/GFI-MailEssentials-and-Send-Policy-Framework2-200x300.jpg" alt="" width="160" height="240" />In <a href="http://www.gfi.com/blog/gfi-mailessentials-send-policy-framework-spf-work/">Part 1</a> of this post we examined how SPF works. Now we&#8217;ll go into how to create and publish SPF records.</p>
<h3>Creating an SPF record for your domain</h3>
<p>The procedure outlined below can be divided into several stages:</p>
<ol>
<li>Determine domain name which is used to send emails to the internet</li>
<li>Determine the public IP address(es) that are used to send emails</li>
<li>Create your SPF</li>
<li>Publish the SPF record in your DNS Server</li>
</ol>
<h3>Determine the domain name which is used to send emails to the internet</h3>
<p>An SPF record is created for a domain, therefore you need to first identify what domain is used when emails are sent to the internet from your domain. The domain is the last part of your email address.  For example:</p>
<p><em>Email Address: user[at]gfi.com<br />
Domain: gfi.com</em></p>
<h3><span id="more-172"></span>Determine the public IP address(es) that are used to send emails</h3>
<p>In order for SPF to determine that an email has been received from a legitimate sender, it will check the sender mail server IP address and compare it to the content contained in the SPF record. In order to properly configure an SPF record, you will need to obtain all the public IP addresses which are used to send emails to the internet from your domain.</p>
<h3>Create your SPF record</h3>
<p>The wizard found at <a href="http://www.openspf.org/">http://www.openspf.org/</a> offers a step by step wizard which explains how to create your SPF record. The following procedure will guide you through the wizard:</p>
<ol>
<li>Open <a href="http://www.openspf.org/">http://www.openspf.org/</a> using an Internet Browser</li>
<li>In the &#8216;Deploying SPF&#8217; section, enter your domain which will be used for the SPF record and click &#8216;Go!&#8217;</li>
<li>Complete the form with the details required to create your SPF Record.</li>
<li>Once completed; confirm the data you have entered is correct, click on the &#8216;Continue&#8217;.</li>
<li>The SPF record text will be shown at the bottom of the form.</li>
</ol>
<h3>Publish the SPF record on your DNS Server</h3>
<p>In order for the SPF record to be queried, it must be published on the authoritative DNS server for your domain. The DNS Server could be hosted locally within the organization or managed by your ISP.</p>
<p>If your DNS records are managed by your ISP, you will need to provide the text from the SPF Setup Wizard to your ISP and ask them to add it to the TXT record of your domain.</p>
<p>If the domain is hosted on a local DNS server, you should manually add the TXT SPF record to your DNS Server. The following procedure explains how to add a TXT SPF record on the DNS server included with Windows 2003 Server:</p>
<ol>
<li>Login to the DNS server using administrative privileges</li>
<li>Open the &#8216;DNS&#8217; Console in &#8216;Administrative Tools&#8217;</li>
<li>Expand &#8216;DNS&#8217; &gt; &#8216;Forward Lookup Zones&#8217;</li>
<li>Select and open the domain in which you wish to add the SPF record. Right-click in the record list and select &#8216;Other New Records..&#8217; from the menu.</li>
<li>Select the &#8216;Text (TXT)&#8217; record and click on the &#8216;Create Record&#8230;&#8217; button</li>
<li>Type the SPF record data in the &#8216;Text&#8217; textbox. Click the &#8216;OK&#8217; button.</li>
<li>Click on the &#8216;Done&#8217; button to close the window and the SPF record is added</li>
</ol>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/gfi-mailessentials-sender-policy-framework-spf-work-part-2/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>GFI MailEssentials and Sender Policy Framework (SPF) – what is it and how does it work? (Part 1)</title>
		<link>http://www.gfi.com/blog/gfi-mailessentials-sender-policy-framework-spf-work/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=gfi-mailessentials-sender-policy-framework-spf-work</link>
		<comments>http://www.gfi.com/blog/gfi-mailessentials-sender-policy-framework-spf-work/#comments</comments>
		<pubDate>Mon, 15 Jun 2009 09:48:43 +0000</pubDate>
		<dc:creator>Nicholas Sciberras</dc:creator>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[GFI Fixes It]]></category>
		<category><![CDATA[dns]]></category>
		<category><![CDATA[sender policy frameworks]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=149</guid>
		<description><![CDATA[The Sender Policy Framework (SPF) is a community-based effort that requires senders to publish their mail server in an SPF record. This record is used to detect forged senders. How does SPF work? The basic idea behind Sender Policy Framework &#8230;]]></description>
				<content:encoded><![CDATA[<p><img class="alignright size-medium wp-image-223" style="margin: 10px;" title="GFI MailEssentials and Send Policy Framework" src="http://www.gfi.com/blog/wp-content/uploads/2009/06/GFI-MailEssentials-and-Send-Policy-Framework-300x225.jpg" alt="" width="210" height="158" />The Sender Policy Framework (SPF) is a community-based effort that requires senders to publish their mail server in an SPF record. This record is used to detect forged senders.</p>
<h3>How does SPF work?</h3>
<p>The basic idea behind Sender Policy Framework (SPF) is simple: whenever an email is received a check is made to see if the server which sent it is allowed to send emails on behalf of the senders’ domain.</p>
<p>For example: you receive a message from <a href="mailto:'somebody@somedomain.com'">&#8216;somebody@somedomain.com&#8217;</a> from a machine with IP &#8217;121.122.123.124&#8242;. SPF works by asking &#8216;somedomain.com&#8217; if &#8217;121.122.123.124&#8242; is allowed to send email on its behalf.</p>
<p>For SPF to work, the sender’s domain (&#8216;somedomain.com&#8217; in this example) must publish, via DNS TXT records, the hosts which are allowed to send email on its behalf. Thus SPF requires both sender and recipient collaboration. If this information is not published, then SPF will return &#8216;unknown&#8217;, or &#8216;none&#8217;.</p>
<p><span id="more-149"></span>SPF checks the last external IP. If GFI MailEssentials is installed on a machine in the perimeter then the last external IP is easily obtainable by checking the IP of the mail server that connected to Internet Information Services (IIS).</p>
<p>If GFI MailEssentials is not installed on the perimeter server, you need to configure the perimeter SMTP servers that are receiving emails from the internet. GFI MailEssentials will parse the message headers for the &#8216;Received lines&#8217; which will contain the IP addresses of the servers from where the message has passed. To get the IP address of the sender’s mail server, GFI MailEssentials checks all the IP’s in the header until an IP is:</p>
<ol>
<li>Found in the perimeter SMTP servers list.</li>
<li>Followed by an IP address which is not in the perimeter SMTP servers list. The latter IP is the external IP.</li>
</ol>
<p>The following example assumes that 216.218.202.33 is in the perimeter list. GFI MailEssentials is installed on <em>&#8216;hostb&#8217; </em>and is being forwarded email from <em>&#8216;hosta&#8217;</em> (216.218.202.33).</p>
<p><em>Received: from hosta ([216.218.202.33]) by hostb with Microsoft SMTPSVC;<br />
Tue, 11 Jan 2005 18:53:30 +0100<br />
Received: from external.com ([121.122.123.124]) by hosta with Microsoft SMTPSVC;<br />
Tue, 11 Jan 2005 18:53:19 +0100</em><br />
<em>…<br />
From: &lt;</em><a href="mailto:someone@somedomain.com"><em>someone@somedomain.com</em></a><em>&gt;</em></p>
<p>Using the logic detailed above, GFI MailEssentials will find the perimeter IP which is followed by a non-perimeter IP, in this case 121.122.123.124. If somedomain.com confirms that 121.122.123.124 is allowed to send email on its behalf, the email will be passed through the rest of the anti-spam plug-in, otherwise the email is marked as spam.</p>
<p>Points to note:</p>
<ul>
<li>It is important to note that all public perimeter IP’s should be included in the GFI MailEssentials configuration as GFI MailEssentials will search for them when parsing message headers.</li>
<li>Confirm which DNS-server GFI MailEssentials uses. In most cases this will be an internal DNS server. If you have an external zone in your internal DNS server, then you need to setup the SPF-record for your domain in the DNS-record of your internal DNS server as well as the external one.</li>
<li>More information regarding the Sender Policy Framework (SPF) can be found at: <a href="http://openspf.org/">http://openspf.org/</a></li>
<li>Further information on how to create an SPF record for your domain can be found in the following Microsoft Knowledgebase article:  <a href="http://www.microsoft.com/mscorp/safety/content/technologies/senderid/wizard/">http://www.microsoft.com/mscorp/safety/content/technologies/senderid/wizard/</a></li>
</ul>
<p>In <a href="http://www.gfi.com/blog/gfi-mailessentials-send-policy-framework-spf-work-part-2/">Part 2</a> of this article we will be reviewing how to create SPF records for your domain and determine domain names.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/gfi-mailessentials-sender-policy-framework-spf-work/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

 Served from: www.gfi.com @ 2013-09-15 03:36:27 by W3 Total Cache --