Tech Zone

Trick or treat – the 21 scariest things on your network

With Halloween just around the corner, are you prepared for tricks, or hoping only for treats. There’s an entire host of evil out there. How many of these ghastly things might be found on your network?

Continue reading

How to troubleshoot Exchange ActiveSync connections

Ensuring that Exchange ActiveSync is working properly on both your Exchange infrastructure and your users’ myriad mobile devices is one of the most important things you can do. Usually, EAS works perfectly well, so this is not a problem for you. But occasionally, things do fail, so knowing what to look at and how to troubleshoot are critical skills. This article should help get you started.

Continue reading

How much do you trust technology?

Machines are analyzing the data and making many of the decisions that used to be the province of human beings. In some cases, this has had very positive results; in others, not so much.

Continue reading

20 things that could happen when there’s no web monitoring software

Using 20 GIFs, we take a look at some of the ‘bad’ things that could happen if you’re not paying close attention to how your Internet is being used in the workplace.

Continue reading

The top 24 facepalm moments in information security

With all the media attention focused on ShellShock, we thought it would be a good time to take a look back at some other web-shaking security events of the past. In chronological order, here are 24 facepalm moments in information security.

Continue reading

To split or not to split? That is the question

Whenever a company wants to set up a VPN for its remote users, one of the major decision points that always comes up is whether or not to support split tunneling. In this post we define split tunneling and some related terms.

Continue reading

Troubleshooting VPN client connectivity

To help troubleshoot VPN client connectivity, here are some pointers that may save you some time.

Continue reading

Dangerous Bash Bug lurking in Linux and OS X

Some security experts are calling it “bigger than Heartbleed”. A newly discovered bug in the Bash shell can be exploited to run malicious code immediately after the shell is invoked in Linux and UNIX-based operating systems. Bash shell is one of the most-used utilities for Linux/UNIX.

Continue reading

The best 24 free tools for troubleshooting

Here are 24 great free tools to help you troubleshoot almost any issue!

Continue reading

Security 101: Introductions and vocabulary

With security being such an important part of every task a sysadmin undertakes, and with the stakes so high, we are starting a new series on the GFI Blog that deals with Security 101. The last week of every month, we will cover something along the lines of a “Security 101” topic to help those who need security, but don’t have the background, to improve their skills.

Continue reading

Find us on Facebook

Follow us on Twitter