<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Talk Tech To Me - GFI Blog &#187; Tech Zone</title>
	<atom:link href="http://www.gfi.com/blog/category/tttm/tech-zone/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.gfi.com/blog</link>
	<description>Brought to you by GFI Software</description>
	<lastBuildDate>Fri, 09 Aug 2013 17:06:10 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
		<item>
		<title>Top 10 Free System Troubleshooting Tools for SysAdmins</title>
		<link>http://www.gfi.com/blog/top-10-free-system-troubleshooting-tools-for-sysadmins/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=top-10-free-system-troubleshooting-tools-for-sysadmins</link>
		<comments>http://www.gfi.com/blog/top-10-free-system-troubleshooting-tools-for-sysadmins/#comments</comments>
		<pubDate>Sun, 28 Jul 2013 13:00:45 +0000</pubDate>
		<dc:creator>Andrew Zammit Tabona</dc:creator>
				<category><![CDATA[Tech Zone]]></category>
		<category><![CDATA[TTTM]]></category>
		<category><![CDATA[AccExp]]></category>
		<category><![CDATA[CurrPorts]]></category>
		<category><![CDATA[Joeware Utilities]]></category>
		<category><![CDATA[LastActivityView]]></category>
		<category><![CDATA[Microsoft Fix It Solution Center]]></category>
		<category><![CDATA[Microsoft SysInternals Suite]]></category>
		<category><![CDATA[NirLauncher]]></category>
		<category><![CDATA[PowerShell Troubleshooting Packs]]></category>
		<category><![CDATA[Problem Steps Recorder]]></category>
		<category><![CDATA[psr.exe]]></category>
		<category><![CDATA[Reliability Monitor]]></category>
		<category><![CDATA[SidToName]]></category>
		<category><![CDATA[SysAdmins]]></category>
		<category><![CDATA[system troubleshooting]]></category>
		<category><![CDATA[system troubleshooting tools]]></category>
		<category><![CDATA[troubleshooting tools]]></category>
		<category><![CDATA[USBDeview]]></category>
		<category><![CDATA[WELT]]></category>
		<category><![CDATA[WinAudit]]></category>
		<category><![CDATA[WSCC]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=10733</guid>
		<description><![CDATA[To conclude our SysAdmin Week series, we thought of sharing 10 of the best free tools / packages for troubleshooting system issues – one of the biggest headaches for sys admins! These tools should help you, as an admin, to &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/FBSysAdminWeekday7.jpg"><img class=" wp-image-10751 alignright" style="border: 0px solid black; margin: 10px;" alt="FBSysAdminWeekday7" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/FBSysAdminWeekday7-300x300.jpg" width="240" height="240" /></a>To conclude our SysAdmin Week series, we thought of sharing 10 of the best free tools / packages for troubleshooting system issues – one of the biggest headaches for sys admins! These tools should help you, as an admin, to fix the problem or identify the root cause more quickly. You can either use these tools yourself, or provide them to a user who is experiencing the issue, for them to gather the information needed. Even if you may have heard of some of these tools before, I’m confident that you’ll find a gem or two on this list.<span id="more-10733"></span></p>
<h2>1. <a href="http://support.microsoft.com/fixit/">Microsoft Fix It Solution Center</a></h2>
<p>The Microsoft Fix It Solution Center is an online tool that helps you to quickly find and fix common system issues. Once you’ve entered the symptoms, you can either download an executable to automatically fix the issue or be directed to a relevant Microsoft Knowledgebase Article that explains what the cause and recommend workaround is.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/MicrosoftFixIt1.png"><img class="aligncenter size-medium wp-image-10735" alt="MicrosoftFixIt" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/MicrosoftFixIt1-300x269.png" width="300" height="269" /></a></p>
<p>To use the Microsoft Fix It Solution Center, simply open <a href="http://support.microsoft.com/fixit/">http://support.microsoft.com/fixit/</a> in a web browser, select a problem area from “Step 1”, choose what type of problem you are trying to fix from the list in “Step 2” and then choose which solution you’d like to execute or learn more about from “Step 3”.</p>
<h2>2. Problem Steps Recorder</h2>
<p>Hidden away in Windows 7 / Windows 2008 and above is a neat little utility called Problem Steps Recorder (psr.exe). The Problem Steps Recorder will record the step-by-step interactions that occur while the user replicates the problem, taking screenshots of every action. It then bundles all this into a report with detailed information and any relevant error logs.</p>
<p>This tool is great if you have a user in your environment who is experiencing an issue that you want to gain more information about and the steps they took to reproduce the problem, or if you want to create a report to send to a third party vendor as part of a support case.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/ProblemStepsRecorder.png"><img class="aligncenter size-medium wp-image-10736" alt="ProblemStepsRecorder" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/ProblemStepsRecorder-300x46.png" width="300" height="46" /></a></p>
<p>To launch the Problem Steps Recorder, go to the Start menu and type “psr.exe”. Click “Start Record” and the tool will record every interaction from then on. You can add comments during the recording process and then click “Stop Record” to save the report as an *.mht file within a zip archive.</p>
<h2>3. Reliability Monitor</h2>
<p>Windows Vista / 2008 and above include a tool called Reliability Monitor. This tool provides an overview of overall system stability and details about events that can impact reliability. The idea is to pinpoint any troublesome areas and take steps to improve system reliability based on what you learn (e.g. you might identify a trend in a certain application crashing when opening a certain file type).</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/MicrosoftReliabilityMonitor.png"><img class="aligncenter size-medium wp-image-10737" alt="MicrosoftReliabilityMonitor" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/MicrosoftReliabilityMonitor-300x175.png" width="300" height="175" /></a></p>
<p>To run the Microsoft Reliability Monitor, go to the Start menu and type ‘Reliability’. This will bring up a “View reliability history” shortcut. Clicking on this shortcut will launch the Reliability Monitor directly. You can also launch this tool from the Performance Monitor tool by right clicking on Monitoring Tools and selecting “View system reliability”.</p>
<p>Start by selecting whether you want to view information by Days or Weeks, and then click on a specific area within the graph to view information in the bottom hand pane. Once you’ve viewed reliability history for a specified period, you can choose to save the information to a file, view a list of all problem reports and check for solutions to problems.</p>
<h2>4. <a href="http://www.gunnerinc.com/welt.htm">WELT (Windows Error Lookup Tool)</a></h2>
<p>When troubleshooting issues, you may come across Win32, HRESULT, NTSTATUS or STOP error codes which are likely to mean nothing to you or I. Using WELT you can find out what the error code means in plain English and what it relates to.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/WELT.png"><img class="aligncenter size-medium wp-image-10738" alt="WELT" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/WELT-300x163.png" width="300" height="163" /></a></p>
<p>To launch WELT, simply execute Windows Error Lookup Tool.exe from the folder where you extracted welt.zip to. Enter the error code in the textbox and the error details will appear automatically.</p>
<h2>5. PowerShell Troubleshooting Packs</h2>
<p>As I mentioned in my article entitled <a href="http://www.gfi.com/blog/windows-powershell-essential-admin-scripts-part-1/">Windows PowerShell™: Essential Admin Scripts (Part 1)</a> the PowerShell Troubleshooting Packs (bundled with Windows 7/2008 and above) can be really handy when troubleshooting system issues. As such, they are a collection of PowerShell scripts that you can use to diagnose different aspects of your servers, clients or network. Different packages are available to troubleshoot printers, networks, performance, power, Windows Update, etc.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/TroubleshootingPacks.png"><img class="aligncenter size-medium wp-image-10739" alt="TroubleshootingPacks" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/TroubleshootingPacks-300x137.png" width="300" height="137" /></a></p>
<p>To run a PowerShell Troubleshooting Pack, open a PowerShell command prompt and import the modules associated with the pack by running the “Import-Module TroubleshootingPack” command. Then, run the following command to start the desired Troubleshooting Pack:</p>
<p>Get-TroubleshootingPack &lt;TroubleshootingPackLocation&gt; | Invoke-TroubleshootingPack</p>
<h2>6. <a href="http://www.pxserver.com/WinAudit.htm">WinAudit</a></h2>
<p>As part of the troubleshooting process, it is helpful to know as much information as you can about the machine where the problem resides to assist in finding a solution more quickly. WinAudit scans your computer and gathers a whole raft of information about Installed Software, TCP/IP settings, Drives, Error Logs, etc.</p>
<p><b>Note:</b> At the time of writing, the download link available from the developer’s website was broken. You can download the latest version of this software from a popular application download site like CNET.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/WinAudit.png"><img class="aligncenter size-medium wp-image-10740" alt="WinAudit" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/WinAudit-300x174.png" width="300" height="174" /></a></p>
<p>To start an audit of your local machine, simply execute WinAudit.exe to start the application and then click the “Audit” icon in the top left hand corner.  Once the audit is complete, you can start to review the information from the different categories in the left hand pane, or save the information as a PDF / CSV / TXT / HTML file.</p>
<h2>7. <a href="http://www.joeware.net/freetools/index.htm">Joeware Utilities</a></h2>
<p>Joeware Utilities are a list of free troubleshooting and system information utilities aimed at making the life of an administrator easier. These tools are built by a system administrator from his own experience of not finding a tool out there that did the job he needed for whatever he was trying to solve. The tools available include anything from tools that dump user information from Active Directory, modify a user account’s expiration flag or perform TCP/IP port connection testing.</p>
<p><b>Note:</b> Unfortunately Joeware Utilities do not come as a bundled package and will have to be downloaded individually from the website. However, using a small add-on for the NirLauncher application mention below, you can download and categorize the tools ready to be launched from the NirLauncher application itself.</p>
<p>Some of the tools available from Joeware Utilities include:</p>
<p><b><i>SidToName</i></b></p>
<p>SidToName is a command line tool that resolves SIDs (Security Identifiers) to friendly display names. You provide it with a valid SID and it returns the object name associated with that SID.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/SidToName.png"><img class="aligncenter size-medium wp-image-10741" alt="SidToName" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/SidToName-300x148.png" width="300" height="148" /></a></p>
<p><b><i>AccExp</i></b></p>
<p>AccExp is a command line tool that you can use to modify or read the expiration date of local user accounts.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/AccExp.png"><img class="aligncenter size-medium wp-image-10742" alt="AccExp" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/AccExp-300x148.png" width="300" height="148" /></a></p>
<h2>8. <a href="http://launcher.nirsoft.net/download.html">Nirsoft NirLauncher</a></h2>
<p>NirLauncher is an application that bundles more than 170 portable freeware utilities. The tools available include password recovery tools, Internet tools, programming tools, and system tools – all of which can be used for troubleshooting and information gathering.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/NirLauncher.png"><img class="aligncenter size-medium wp-image-10743" alt="NirLauncher" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/NirLauncher-300x229.png" width="300" height="229" /></a></p>
<p>Some of the most popular tools bundled with NirSoft NirLauncher include:</p>
<p><b><i>USBDeview</i></b></p>
<p>USBDeview is a small application that lists all current and previously connected USB devices on a local or remote machine. USB device information includes device name/description, device type, serial number, the date/time that the device was added or last used, VendorID, etc.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/USBDeview.png"><img class="aligncenter size-medium wp-image-10744" alt="USBDeview" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/USBDeview-300x135.png" width="300" height="135" /></a></p>
<p><b><i>CurrPorts</i></b></p>
<p>CurrPorts displays a list of all currently open TCP/UDP ports on the local machine. Information about which process opened the port, the time the process was created and the user that created it is displayed. Using CurrPorts you can also close open connections and export the information to a file.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/CurrPorts.png"><img class="aligncenter size-medium wp-image-10745" alt="CurrPorts" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/CurrPorts-300x200.png" width="300" height="200" /></a></p>
<p><b><i>LastActivityView</i></b></p>
<p>Using LastActivityView you can see what actions were taken by a user and what events occurred on the machine. Any activities such as running an executable file, opening a file/folder from Explorer or performing a software installation will be logged. The information can be exported to a CSV / XML / HTML file.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/LastActivityView.png"><img class="aligncenter size-medium wp-image-10746" alt="LastActivityView" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/LastActivityView-300x257.png" width="300" height="257" /></a></p>
<h2>9. <a href="http://technet.microsoft.com/en-gb/sysinternals/bb842062.aspx">Microsoft SysInternals Suite</a></h2>
<p>Microsoft SysInternals Suite is a collection of over 60 lightweight troubleshooting tools all bundled into a single download package. Whatever issue you’re trying to tackle, you are sure to find a tool in this package to help you manage, troubleshoot and diagnose your systems and applications.</p>
<p>Some of the most popular tools bundled in the SysInternals Suite include:</p>
<p><b><i>Autoruns</i></b></p>
<p>Autoruns allows you to view which programs and services are configured to run at system boot up or login, in the order in which Windows processes them.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/Autoruns.png"><img class="aligncenter size-medium wp-image-10747" alt="Autoruns" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/Autoruns-300x213.png" width="300" height="213" /></a></p>
<p><b><i>Process Monitor</i></b></p>
<p>Using Process Monitor you can troubleshoot application and system related issues by monitoring activity related to processes, threads, DLLs, the registry and file system in real-time.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/ProcessMonitor.png"><img class="aligncenter size-medium wp-image-10748" alt="ProcessMonitor" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/ProcessMonitor-300x214.png" width="300" height="214" /></a></p>
<p><b><i>AccessEnum</i></b></p>
<p>Using AccessEnum you can quickly view permissions of file system directories or registry keys and then save the results to a text file and compare results with a previously saved log.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/AccessEnum.png"><img class="aligncenter size-medium wp-image-10749" alt="AccessEnum" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/AccessEnum-300x154.png" width="300" height="154" /></a></p>
<h2>10. <a href="http://www.kls-soft.com/wscc/downloads.php">WSCC (Windows System Control Center)</a></h2>
<p>WSCC is not a troubleshooting tool per se, but it does facilitate issue troubleshooting by acting as an inventory for various system troubleshooting tool suites (such as those from Microsoft SysInternals and NirSoft). It allows you to install, update, execute and categorize the entire collection of tools in a single location.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/WSCC.png"><img class="aligncenter size-medium wp-image-10750" alt="WSCC" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/WSCC-300x294.png" width="300" height="294" /></a></p>
<p>When you launch WSCC for the first time, you are given the option to download and install the latest versions of the entire set of over 270 tools. If you choose not to install them locally, WSCC will download each application when you first click on it and store the file in a temp folder within the WSCC directory. To launch a troubleshooting tool, choose a tool from the category within the navigation pane on the left hand side. You can also add favourite tools to the Favourites folder or search for a utility by name.</p>
<p>Are there any free tools not on this list that you’ve found useful and would like to share with the community?</p>
<p><em><strong>Like our posts? Subscribe to our <a href="http://feeds.feedburner.com/TalkTechToMe-All">RSS feed</a> or email feed (on the right hand side) now, and be the first to get them!</strong></em></p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/top-10-free-system-troubleshooting-tools-for-sysadmins/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
		<item>
		<title>26 Ways to Say &#8216;Happy SysAdmin Day!&#8217;</title>
		<link>http://www.gfi.com/blog/26-ways-to-say-happy-sysadmin-day/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=26-ways-to-say-happy-sysadmin-day</link>
		<comments>http://www.gfi.com/blog/26-ways-to-say-happy-sysadmin-day/#comments</comments>
		<pubDate>Thu, 25 Jul 2013 12:37:53 +0000</pubDate>
		<dc:creator>Christina Goggi</dc:creator>
				<category><![CDATA[Tech Zone]]></category>
		<category><![CDATA[TTTM]]></category>
		<category><![CDATA[July 26]]></category>
		<category><![CDATA[Sys admin]]></category>
		<category><![CDATA[sys admin gift]]></category>
		<category><![CDATA[SysAdmin Day]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=10725</guid>
		<description><![CDATA[Around the world and across the Internet, July 26 is known as SysAdmin Day. For 14 years, the last Friday in July has been set aside as a way for users to show a little appreciation for the SysAdmins that &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/FBSysAdminWeekday4.jpg"><img class=" wp-image-10726 alignright" style="border: 0px solid black; margin: 10px;" alt="FBSysAdminWeekday4" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/FBSysAdminWeekday4-300x300.jpg" width="240" height="240" /></a>Around the world and across the Internet, July 26 is known as SysAdmin Day. For 14 years, the last Friday in July has been set aside as a way for users to show a little appreciation for the SysAdmins that keep their systems running, their email free of spam, and their ability to Like comments intact. Consider that your own SysAdmins deserve a little show of appreciation.</p>
<p>To say “thank you”, here’s a list of 26 simple ways you can show your appreciation for those unsung heroes that toil away to keep the servers humming and the tubes unclogged. Some of these are low cost gestures; others might be something the boss should cover or the office should take up a collection, but all are guaranteed to put a smile on the face of that favourite SysAdmin of yours, on the one day a year where you know better than to drop a broken machine off or open a last minute helpdesk ticket.<span id="more-10725"></span></p>
<h2>1.      A card</h2>
<p>When you care enough to send the very best, but you don’t have a lot of money to invest, a nice card at least shows some thought. Just make sure it is a card themed around IT, general geekiness, or otherwise shows that you didn’t pull one out of a card drawer because you forgot about it.</p>
<h2>2.      Coffee shop gift cards</h2>
<p>Whether your SysAdmin’s favourite brew comes from Starbucks or the local shop down the street, a gift card is the gift that keeps on giving, or at least for a couple of cups of really good Joe.</p>
<h2>3.      Mobile store gift cards</h2>
<p>If coffee isn’t their thing, you can bet a gift card to the iTunes Store, Google Marketplace, or Windows Store will be appreciated. Find out what kind of phone they have and get the card to right shop and you can bet that by the end of the day they will have a couple of new apps to try out.</p>
<h2>4.      Amazon gift cards</h2>
<p>While this may be the fallback of last resort, even people ten years in the grave can find <i>something</i> at Amazon that they want.</p>
<h2>5.      Lunch</h2>
<p>You’d be amazed at how far a nice lunch can go towards saying thank you, especially since that SysAdmin usually eats lunch at their desk because there is so much work to do. Whether it’s a one on one affair, or you make it a team event, just providing them the opportunity and excuse to see the sun at least for one day a year is a great gesture to make.</p>
<h2>6.      Dinner</h2>
<p>Better still, buy your SysAdmin dinner, by getting him or her a gift card at a nice restaurant so they can take their significant other out for a nice meal. Remember, every time you call your SysAdmin after hours to fix something, you are impacting their family too. <i>Thank You</i>s should extend to them as well.</p>
<h2>7.      A red Swingline stapler</h2>
<p>The icon of geek and snarkiness, the <a href="http://www.thinkgeek.com/product/61b7/?srp=6">Red Swingline Stapler</a> is something every SysAdmin will love.</p>
<h2>8.      TV Show or movie-themed swag</h2>
<p>With a simple conversation, you can quickly find out what your SysAdmin’s favourite sci-fi TV show or movie is, and then a quick visit to ThinkGeek will provide you with tons of options for low cost, but very cool, thank you gifts. Very few adults will ever buy themselves a Sonic Screwdriver, but secretly, we <i>all </i> want one!</p>
<h2>9.      Poster</h2>
<p>Use the same recon skills as above, but this time visit Amazon for cool movie posters or other theme art so your SysAdmin can pimp their cube in style.</p>
<h2>10. A Pizza party</h2>
<p>Here’s one the whole office can enjoy, and EVERYONE loves pizza. And since SysAdmin’s day is on a Friday, it’s a perfect fit for the day.</p>
<h2>11. Light Dims LED Light Blocker</h2>
<p>These cool little stickers dim otherwise overly bright lights, and can be applied to TVs, monitors, UPS systems, alarm clocks, or any other status light that needs to be seen, but is just a bit too blinding for most. Check them out at: <a href="http://www.thinkgeek.com/product/eeb6/?srp=1">http://www.thinkgeek.com/product/eeb6/?srp=1</a></p>
<h2>12. Hacking putty</h2>
<p>Part silly putty, part play-dough, part caulk, and completely awesome &#8211; <a href="http://www.thinkgeek.com/product/e976/?pfm=Search&amp;t=hacking%20putty">Hacking Putty</a> can be used to fix or enhance almost anything.</p>
<h2>13. Star Trek TOS Phaser Laser Pointer</h2>
<p>Anyone who needs to demonstrate or point out anything needs a laser pointer, and every SysAdmin has pretended that they had a phaser when they were using one. Here’s a gift that says thank you with a nod to having fun: http://www.thinkgeek.com/product/1124/?srp=2</p>
<h2>14. Zombies are in</h2>
<p>Did you know that Zombies are “in” right now? Anything from the Walking Dead to World War Z to remakes of George Romero movies are selling like mad right now, and thank you gifts that play into this will bring a smile and a chuckle to any SysAdmin’s face.</p>
<h2>15. Powerstrip with USB</h2>
<p>Every single person that sees one of these in action wants one. Get on your SysAdmin’s special list with this as a thank you: http://www.amazon.com/Outlets-To-Power-Strip-USB/dp/B0018MEBNG/ref=sr_1_4?ie=UTF8&amp;qid=1374538925&amp;sr=8-4&amp;keywords=power+strip+usb</p>
<h2>16. Bawls</h2>
<p>Long hours mean a need for caffeine and sometimes coffee just won’t cut it. A case of <a href="http://www.amazon.com/Bawls-Guarana-Case-24-Bottles/dp/B001KJK2PI/ref=sr_1_cc_2?s=aps&amp;ie=UTF8&amp;qid=1374538955&amp;sr=1-2-catcorr&amp;keywords=bawls">Bawls</a> is a delicious and refreshing way to hold of sleepiness during those late night changes.</p>
<h2>17. Caffeinated mints</h2>
<p>And these can not only fight off fatigue, but bad breath as well. It’s a multitasker, and any SysAdmin will appreciate that!</p>
<h2>18. Herbal Tea collection</h2>
<p>Of course, too much caffeine can be a bad thing. Many SysAdmins have discovered the benefits and the deliciousness of a good cuppa, and herbal teas can help you relax without hyping you up. Show your SysAdmin you care without feeding their addiction.</p>
<h2>19. Emergency battery</h2>
<p>Everyone needs more power, and when your cell phone is dying, nothing is more helpful than some emergency power. USB batteries come in a variety of sizes and capacities, and can save the day time and again.</p>
<h2>20. A really cool coffee mug</h2>
<p>Can you tell coffee is a big deal to SysAdmins. A cool coffee mug makes a statement, and can also handle those herbal teas. Look for one that plays to the TV or movie tie in for bonus points.</p>
<h2>21. Anything by Neil Stephenson</h2>
<p>A SysAdmin’s folk hero, anything that Neil Stephenson was involved in creating will be a greatly appreciated gesture, and you will go up at least five points in the recipient’s opinion.</p>
<h2>22. Like/Dislike stamp set</h2>
<p>Even SysAdmins who aren’t on Facebook will love these. I bet they will even use them on their TPS reports: http://www.thinkgeek.com/product/e5f5/</p>
<h2>23. Cable organizers set</h2>
<p>Velcro is so over. The new hotness is cable organization using silicone polymers and oddly-shaped, brightly colored widgets to keep cables in place, bound together, or otherwise organized.</p>
<h2>24. Paracord survival bracelet</h2>
<p>Everyone wants one… but many people think they will look silly if they buy one for themselves. Help your SysAdmin get past that mental block. If disaster ever strikes, you know they will know how to McGyver something out of the bracelet to save you all – or at least, your email.</p>
<h2>25. Beer</h2>
<p>Free speech, free beer, it’s all good. Find out their favorite and get them a case. It’s the kind of gift that says…you work your #$(&amp; off, thanks, now have a cold one!</p>
<h2>26. Programmable LED light</h2>
<p>The last on our list has no practical value, which is one reason no SysAdmin will ever buy it for themselves… but they are so cool! Replacing their desk lamp with this bulb will add new factors to coolness, and help them stay awake during those interminable conference calls: <a href="http://www.amazon.com/HitLights-BlueLux-Changing-Quality-Feature/dp/B005SHR2C4/ref=cm_cr_dp_asin_lnk">http://www.amazon.com/HitLights-BlueLux-Changing-Quality-Feature/dp/B005SHR2C4/ref=cm_cr_dp_asin_lnk</a></p>
<p>Twenty-six ways to say thank you to a SysAdmin that toils indefatigably for you 24/7/365. It’s one day a year that you get to really show your gratitude to them, so pick one from the list above, and remember your SysAdmin this Friday!</p>
<p><em><strong>Like our posts? Subscribe to our <a href="http://feeds.feedburner.com/TalkTechToMe-All">RSS feed</a> or email feed (on the right hand side) now, and be the first to get them!</strong></em></p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/26-ways-to-say-happy-sysadmin-day/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
		<item>
		<title>The Top 20 Free File Management Tools for Sys Admins</title>
		<link>http://www.gfi.com/blog/the-top-20-free-file-management-tools-for-sys-admins/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-top-20-free-file-management-tools-for-sys-admins</link>
		<comments>http://www.gfi.com/blog/the-top-20-free-file-management-tools-for-sys-admins/#comments</comments>
		<pubDate>Wed, 24 Jul 2013 14:45:33 +0000</pubDate>
		<dc:creator>Andrew Zammit Tabona</dc:creator>
				<category><![CDATA[Tech Zone]]></category>
		<category><![CDATA[TTTM]]></category>
		<category><![CDATA[7-Zip]]></category>
		<category><![CDATA[Advanced Remaner Portable]]></category>
		<category><![CDATA[archiving]]></category>
		<category><![CDATA[AxCrypt]]></category>
		<category><![CDATA[Better Explorer]]></category>
		<category><![CDATA[Bulk Rename Utility]]></category>
		<category><![CDATA[copying]]></category>
		<category><![CDATA[de-duplication]]></category>
		<category><![CDATA[Duplicate Cleaner]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[ExamDiff]]></category>
		<category><![CDATA[file comparison]]></category>
		<category><![CDATA[File Management Tools]]></category>
		<category><![CDATA[File Splitter]]></category>
		<category><![CDATA[Free Opener]]></category>
		<category><![CDATA[FreeFileSync]]></category>
		<category><![CDATA[Hash Tool]]></category>
		<category><![CDATA[Locate32]]></category>
		<category><![CDATA[merging]]></category>
		<category><![CDATA[My Lockbox]]></category>
		<category><![CDATA[PeaZip]]></category>
		<category><![CDATA[renaming]]></category>
		<category><![CDATA[search]]></category>
		<category><![CDATA[SearchMyFiles]]></category>
		<category><![CDATA[Steganos LockNote]]></category>
		<category><![CDATA[syncing]]></category>
		<category><![CDATA[SyncToy]]></category>
		<category><![CDATA[Sys Admins]]></category>
		<category><![CDATA[TeraCopy]]></category>
		<category><![CDATA[Universal Extractor]]></category>
		<category><![CDATA[WinMerge]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=10701</guid>
		<description><![CDATA[Following yesterday’s post, we have compiled another list of free tools for sys admins. Today’s list presents 20 of the best free tools for file comparison, archiving, encryption, renaming, de-duplication, merging, copying, syncing and search. Even if you may have &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/FBSysAdminWeekday3a.jpg"><img class=" wp-image-10723 alignright" style="border: 0px solid black; margin: 10px;" alt="FBSysAdminWeekday3a" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/FBSysAdminWeekday3a-300x300.jpg" width="180" height="180" /></a>Following <a href="http://www.gfi.com/blog/the-top-20-free-network-monitoring-and-analysis-tools-for-sys-admins/">yesterday’s post</a>, we have compiled another list of free tools for sys admins. Today’s list presents 20 of the best free tools for file comparison, archiving, encryption, renaming, de-duplication, merging, copying, syncing and search. Even if you may have heard of some of these tools before, we’re confident that you’ll find a gem or two amongst this list – and if you know of any others, leave us a comment below!<span id="more-10701"></span><b></b></p>
<p><b>1. <a href="http://codesector.com/teracopy">TeraCopy</a></b></p>
<p>TeraCopy acts as an alternative to the built-in copy and move process in Windows. It is designed to copy and move files either locally or over the network at a faster rate. It allows you to pause and resume file transfer activities, it integrates into the Windows shell and has an automatic error recovery mechanism in case something goes wrong during the transfer process.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/TeraCopy.png"><img class="aligncenter size-medium wp-image-10702" alt="TeraCopy" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/TeraCopy-300x185.png" width="300" height="185" /></a></p>
<p>Once you’ve installed TeraCopy, you can launch the application from the Start Menu or by right clicking on a file or folder and selecting “TeraCopy…” from the context menu. When you’ve selected which files to transfer and where to transfer them to, you can then select which action to take after the process is complete (e.g. shutdown machine or close window). Finally, you kick the process of by clicking the “Copy” or “Move” buttons. TeraCopy keeps a log of all actions taken in the drop down box at the bottom of the window.</p>
<p><b>2. <a href="http://www.steganos.com/us/products/for-free/locknote/overview/">Steganos LockNote</a></b></p>
<p>Steganos LockNote allows you to securely store confidential notes such as license keys, passwords, phone numbers, etc. It uses AES-256 encryption to store your text in a self-executable container that requires a password to open it.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/LockNote.png"><img class="aligncenter size-medium wp-image-10703" alt="LockNote" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/LockNote-300x209.png" width="300" height="209" /></a></p>
<p>Steganos LockNote comes as a standalone application which does not require installation. When you launch LockNote.exe you are presented with a text editor similar to notepad.exe. Type whatever text you wish to be kept secret and go to File &gt; Save As… to save the note as an encrypted container. You will be prompted for a password and the resulting output file will be in *.exe format.</p>
<p><b>3. <a href="http://www.digitalvolcano.co.uk/duplicatecleaner.html">Duplicate Cleaner</a></b></p>
<p>Duplicate Cleaner is a file de-duplication tool that removes redundant copies of files from a specified hard drive or network location. It works by generating an MD5 hash of each file and then comparing hashes for duplicates. It also gives you the option to search for files using a byte-to-byte comparison. Once the duplicate files have been found, you can choose to delete them or move them to an archive location.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/DuplicateCleaner.png"><img class="aligncenter size-medium wp-image-10704" alt="DuplicateCleaner" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/DuplicateCleaner-300x169.png" width="300" height="169" /></a></p>
<p>When you launch Duplicate Cleaner, you first specify the search criteria from the first available tab, then you tell it where to look from the “Scan Location” tab before hitting “Scan Now”. A summary window will appear showing how many files were scanned and how many duplicates were found. The “Duplicate Files” tab highlights which files need attention.</p>
<p><b>4. <a href="http://www.bulkrenameutility.co.uk/">Bulk Rename Utility</a></b></p>
<p>Bulk Rename Utility is a lightweight yet powerful application for renaming files and folders using an extensive array of criteria. Using this tool you can remove, add or change text and numbers within the file name, add date/time stamps, change case, modify file and folder attributes and preview what the changes will look like before you go ahead with them. The Bulk Rename Utility also supports regular expressions for additional flexibility.</p>
<p><b>Note: </b>The Bulk Rename Utility comes in a command line version too. Using the command line version of the utility you can create scheduled jobs to perform a repetitive action at a specified time (e.g. rename a set of log files or backup files every day at midnight).</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/BulkRenameUtility.png"><img class="aligncenter size-medium wp-image-10705" alt="BulkRenameUtility" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/BulkRenameUtility-300x198.png" width="300" height="198" /></a></p>
<p>When you launch the Bulk Rename Utility you are presented with the navigation pane on the left hand side, the preview pane on the right hand side and a multitude of rename options at the bottom. Start by navigating to a folder that contains the files you wish to rename from the navigation pane or find the folder in Windows Explorer, right click on it and choose “Bulk Rename Here”.</p>
<p><b>5. <a href="http://www.freeopener.com/">Free Opener</a></b></p>
<p>Free Opener allows you to open over 80 different file formats from a single interface. Even if you don’t have the native application installed, you can quickly fire up Free Opener to open that file format. Free Opener supports Microsoft Office files, Archive files, Image files, Code files, Video files and Audio files, amongst others. Essentially it is just like having a Document Viewer, Image Viewer, Media Player and Archive Viewer all rolled into one!</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/FreeOpener.png"><img class="aligncenter size-medium wp-image-10706" alt="FreeOpener" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/FreeOpener-300x237.png" width="300" height="237" /></a></p>
<p>When you launch Free Opener, the first thing you should do is go to File &gt; File Associations to enable which file types you want to be associated with the Free Opener application. This will mean that any file that you double click to open will be opened automatically in Free Opener (if the file type is supported). Alternatively, click on the “Open” icon or go to File &gt; Open to choose a file to open in Free Opener. When you open a file, at the bottom of the window a menu bar will appear containing some edit options (which change depending on the file type you have opened).</p>
<p><b>6. <a href="http://sourceforge.net/projects/freefilesync/">FreeFileSync</a></b></p>
<p>FreeFileSync is a folder comparison and synchronization tool designed with usability and performance in mind. FreeFileSync allows you to save the configuration as a “.batch” file which you can then use to schedule a task for automatic folder synchronization.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/FreeFileSync1.png"><img class="aligncenter size-medium wp-image-10708" alt="FreeFileSync" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/FreeFileSync1-300x202.png" width="300" height="202" /></a></p>
<p>When you launch FreeFileSync, add a path to the left and right hand side of the window and hit the “Compare” button to compare both locations side-by-side. FreeFileSync will use a series of icons to highlight what’s different between both folders. You can then hit the “Synchronize” button to sync both folders. Go to Program &gt; Save as batch job… to save the configuration as a batch job for use later when scheduling a task.</p>
<p><b>7. <a href="http://peazip.sourceforge.net/">PeaZip</a></b></p>
<p>PeaZip is a cross-platform file and archive manager that supports volume spanning, high levels of compression and encryption, and support for a wide range of archiving formats. Using PeaZip you can create archive formats such as 7Z, ARC, BZ2, GZ, PAQ, PEA, QUAD/BALZ, TAR, UPX, WIM, XZ, and ZIP, and extract over 150 archive formats, including ACE, CAB, ISO, RAR, UDF, ZIPX and many more. PeaZip features include creating, converting and extracting multiple archives at once, creating self-extracting archives, secure data deletion, checksum creation and hashing.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/PeaZip.png"><img class="aligncenter size-medium wp-image-10709" alt="PeaZip" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/PeaZip-300x191.png" width="300" height="191" /></a></p>
<p>Once PeaZip is installed, you can either open or create an archive using the “Open as archive” or “Add to archive” context menu options respectively, or launch the application and take the required action from there. Once in the PeaZip UI, simply navigate to the required file or folder from the left hand pane and then click one of the icons in the top menu to take an action.</p>
<p><b>8. <a href="http://sourceforge.net/projects/winmerge/?source=directory">WinMerge</a></b></p>
<p>WinMerge is a file comparison and merging tool that visually displays the differences side-by-side. This tool is useful for helping to determine what has changed between two files versions and then merging those changes. WinMerge supports Unicode and regular expressions and includes Visual SourceSafe and Windows Shell integration.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/WinMerge.png"><img class="aligncenter size-medium wp-image-10710" alt="WinMerge" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/WinMerge-300x182.png" width="300" height="182" /></a></p>
<p>When you launch WinMerge and choose to open files to compare, you are asked to select a file for the left hand side and a file for the right hand side. Differences between these files are shown in the Location Pane and highlighted throughout both documents.</p>
<p><b>9. <a href="http://www.nirsoft.net/utils/search_my_files.html">SearchMyFiles</a></b></p>
<p>SearchMyFiles aims to be an alternative to the Windows &#8220;Search For Files And Folders&#8221; process, allowing more flexible and accurate searches to be performed. You can search using wildcards, last modified/created/accessed time, file attributes, file content (text or binary search) and by file size. Search results can be saved as a text, html, csv or xml file. SearchMyFiles comes as a standalone portable application that doesn&#8217;t require installation &#8211; it can there be run straight off a USB drive.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/SearchMyFiles.png"><img class="aligncenter size-medium wp-image-10711" alt="SearchMyFiles" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/SearchMyFiles-300x215.png" width="300" height="215" /></a></p>
<p>Executing the SearchMyFiles.exe application brings up the Search Options window which allows you to specify where to search and the search criteria to use to bring back results. Simply choose the desired options and hit “Start Search” to have the application perform the search operation.</p>
<p><b>10 <a href="http://sourceforge.net/projects/axcrypt/">AxCrypt</a></b></p>
<p>AxCrypt is a file-level encryption tool that integrates with the Windows shell and allows you to right-click on a file to encrypt or decrypt it using AES-256 encryption. AxCrypt also offers the ability to create a self-extracting archive to securely transfer files to another location (with AxCrypt not being required for decryption on the other end).</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/AxCrypt.png"><img class="aligncenter size-medium wp-image-10712" alt="AxCrypt" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/AxCrypt-288x300.png" width="288" height="300" /></a></p>
<p>Once installed, everything happens from the context menu when you right click on a file. You are given the option to Encrypt or Decrypt the file, manage passphrases or permanently delete the file.</p>
<p><b>11. <a href="http://www.filesplitter.org/">File Splitter</a></b></p>
<p>File Splitter does what it says in the name. It is a super lightweight standalone application that splits files into multiple chunks and merges chunks back into a whole file.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/Splitter.png"><img class="aligncenter size-medium wp-image-10713" alt="Splitter" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/Splitter-300x224.png" width="300" height="224" /></a></p>
<p>When you launch File Splitter, use the “Split file” tab to specify the source file to split and the destination of the file chunks as well as the size of each chuck. Similarly, use the “Join files” tab to specify the chucks to merge into a whole file again and the destination of where you want the joined file to be placed.</p>
<p><b>12. <a href="http://www.digitalvolcano.co.uk/hash.html">Hash Tool</a></b></p>
<p>Hash Tool allows you to quickly and easily calculate the hash of multiple files to verify file integrity. The tool supports Unicode file names and MD5, SHA-1, SHA-256, SHA-384, SHA-512, CRC32 hash types.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/HashTool.png"><img class="aligncenter size-medium wp-image-10714" alt="HashTool" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/HashTool-300x202.png" width="300" height="202" /></a></p>
<p>Start by selecting the hash type from the drop down list and then selecting the files to hash from the “Select File(s)” button. Alternatively, drag and drop the files into the “Results” window for the hash to be automatically calculated. You can then save the results to a txt or csv file or copy them to the clipboard.</p>
<p><b>13. <a href="http://www.prestosoft.com/edp_examdiff.asp#download">ExamDiff</a></b></p>
<p>Similar to the functionality offered in WinMerge, ExamDiff offers a visual side-by-side comparison of two files, highlighting the differences in different colours and giving you the option to navigate through the changes in a number of ways (e.g. using a drop down list).  ExamDiff also comes with command line options allowing you to create a batch file to automate the process.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/ExamDiff.png"><img class="aligncenter size-medium wp-image-10715" alt="ExamDiff" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/ExamDiff-300x172.png" width="300" height="172" /></a></p>
<p>When you launch ExamDiff, you are presented with a dialog box asking you to specify the location of the two files to compare. Once you do this and hit “OK”, the application opens displaying a side-by-side comparison of the files and highlighting lines that have been added, deleted or changed in different colours.</p>
<p><b>14. <a href="http://www.7-zip.org/">7-Zip</a></b></p>
<p>7-Zip is a powerful file archiving utility with a high compression ratio that supports a multitude of compression formats, including 7z, GZIP, TAR, ZIP, CAB, MSI, etc. Features include the ability to create self-extracting archives, adjust the compression level and add password protection. 7-Zip&#8217;s power lies in its compression ratio; it claims to provide a ZIP format compression ratio that is 2-10% better than its competitors and a 7z format compression ratio that is 30-70% better than ZIP format.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/7-Zip.png"><img class="aligncenter size-medium wp-image-10716" alt="7-Zip" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/7-Zip-300x233.png" width="300" height="233" /></a></p>
<p>When you launch the application, navigate to the folder containing the files you wish to archive and hit the “Add” button to create an archive. Alternatively, you can create an archive directly from the context menu by right clicking on a file or folder.</p>
<p><b>15. <strong><a href="http://www.microsoft.com/downloads/en/details.aspx?FamilyID=c26efa36-98e0-4ee9-a7c5-98d0592d8c52">Microsoft SyncToy</a></strong></b></p>
<p>SyncToy is an application that can be used as a mini backup utility to synchronize files and folders between two locations. SyncToy allows you to ‘Synchronize’ FolderA with FolderB where the changes are replicated on both ends, ‘Echo’ FolderA to FolderB where the changes in FolderA are replicated to FolderB, and ‘Contribute’ FolderA to FolderB where the changes in FolderA (except deletions) are replicated to FolderB.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/SyncToy.png"><img class="aligncenter size-medium wp-image-10717" alt="SyncToy" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/SyncToy-300x244.png" width="300" height="244" /></a></p>
<p>When you launch SyncToy, the first thing you need to do is create a New Folder Pair, specifying the left and right folders you wish to synchronize. You can then choose the Synchronization action (i.e. Synchronize, Echo, and Contribute) and which options you wish to use before running the synchronization session.</p>
<p><b>16. <a href="http://fspro.net/my-lockbox/">My LockBox</a></b></p>
<p>My Lockbox is an easy to use application that allows you to hide, lock and password protect a Windows folder on a FAT, FAT32 or NTFS volume so that it&#8217;s only accessible to you.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/MyLockbox.png"><img class="aligncenter size-medium wp-image-10718" alt="MyLockbox" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/MyLockbox-300x149.png" width="300" height="149" /></a></p>
<p>When you launch My Lockbox and choose which folder to protect, it automatically disappears from view within Windows Explorer or from the command line. The only way to access the folder is to launch My Lockbox, enter the password and Unlock the folder.</p>
<p><b>17. <a href="http://www.advancedrenamer.com/download">Advanced Renamer Portable</a></b></p>
<p>Advanced Remaner Portable is a standalone lightweight and easy to use application that can be used to quickly add, remove, replace, or append file or folder names in bulk.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/AdvancedRenamerPortable.png"><img class="aligncenter size-medium wp-image-10719" alt="AdvancedRenamerPortable" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/AdvancedRenamerPortable-300x214.png" width="300" height="214" /></a></p>
<p>Select the “Rename Files” or “Rename Folders” tab to rename files or folders respectively. Add files or folders to the list and create a new method from the left hand pane – here you create the renaming rules you want to apply to the list of files or folders. When you’re ready, hit “START BATCH” to initiate the process.</p>
<p><b>18. <a href="http://locate32.cogit.net/">Locate32</a></b></p>
<p>Locate32 is a search utility that finds files or folders based on their names. Locate32 works by indexing file and folder names in a database and then using the database to quickly return results. Locate32 comes packaged with a command line version that can be used to update and access the databases without any user interaction.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/Locate32.png"><img class="aligncenter size-medium wp-image-10720" alt="Locate32" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/Locate32-300x202.png" width="300" height="202" /></a></p>
<p>When you first launch Locate32, go Tools &gt; Settings &gt; Databases tab to set up your databases. Databases are essentially index locations – any files contained within a location specified in the database will be searchable more quickly. Once you’ve set your databases, use the “Name &amp; Location”, “Size and Date” and “Advanced” tabs to perform your search.</p>
<p><b>19. <a href="http://legroom.net/software/uniextract">Universal Extractor</a>         </b></p>
<p>Universal Extractor is designed to decompress and extract files from virtually any type of archive, regardless of source, file format or compression method. It supports anything from EXE format to ZIP, CAB, ACE, TAR.GZ, ISO, MSI, RAR, PEA and RPM format, amongst many others. It is handy because it saves you from needing different applications to open different archive formats.</p>
<p><b>Note:</b> Universal Extractor does not create archives; it is used only to extract data.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/UniversalExtractor.png"><img class="aligncenter size-medium wp-image-10721" alt="UniversalExtractor" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/UniversalExtractor-300x156.png" width="300" height="156" /></a></p>
<p>Once you open Universal Extractor, specify the location of the archive file and a destination folder where the contents will be extracted to. Press “OK” to start the extraction process. Once installed, Universal Extractor will also be available via the context menu, allowing you to easily right click on an archive and select “UnExtract”.</p>
<p><strong>20. </strong><b><a href="http://better-explorer.com/">Better Explorer</a></b></p>
<p>Better Explorer aims to be a replacement for Windows Explorer. It offers greater functionality and a streamlined UI with Ribbons (much like Microsoft Office) and Tabs. It includes the ability to manage favourites, conditional select, sizing charts (giving a visual representation of the size of a folder), in-built image editing tools, an enhanced search feature, and archive support.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/BetterExplorer.png"><img class="aligncenter size-medium wp-image-10722" alt="BetterExplorer" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/BetterExplorer-300x213.png" width="300" height="213" /></a></p>
<p><b>Note:</b> At the time of writing, this application is still in BETA. It is not recommended that this be installed on a production machine but rather that you use it in a testing environment or on a personal machine at home to try it out before the full version is launched. It made this list because of its potential; if the BETA is anything to go by, Better Explorer certainly looks like one to watch!<strong></strong></p>
<p>Are there any free tools not on this list that you’ve found useful and would like to share with the community? Then leave us a comment below and let us know!</p>
<p><strong><em>Like our posts? Subscribe to our <a href="http://feeds.feedburner.com/TalkTechToMe-All">RSS feed</a> or email feed (on the right hand side) now, and be the first to get them!</em></strong></p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/the-top-20-free-file-management-tools-for-sys-admins/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
		<item>
		<title>The Top 20 Free Network Monitoring and Analysis Tools for Sys Admins</title>
		<link>http://www.gfi.com/blog/the-top-20-free-network-monitoring-and-analysis-tools-for-sys-admins/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-top-20-free-network-monitoring-and-analysis-tools-for-sys-admins</link>
		<comments>http://www.gfi.com/blog/the-top-20-free-network-monitoring-and-analysis-tools-for-sys-admins/#comments</comments>
		<pubDate>Tue, 23 Jul 2013 14:39:55 +0000</pubDate>
		<dc:creator>Andrew Zammit Tabona</dc:creator>
				<category><![CDATA[Tech Zone]]></category>
		<category><![CDATA[TTTM]]></category>
		<category><![CDATA[Angry IP Scanner]]></category>
		<category><![CDATA[BandwidthD]]></category>
		<category><![CDATA[Capsa Free]]></category>
		<category><![CDATA[EasyNetMonitor]]></category>
		<category><![CDATA[Fiddler]]></category>
		<category><![CDATA[free tools]]></category>
		<category><![CDATA[Microsoft Network Monitor]]></category>
		<category><![CDATA[Nagios]]></category>
		<category><![CDATA[Network Analysis Tools]]></category>
		<category><![CDATA[network monitoring]]></category>
		<category><![CDATA[NetworkMiner]]></category>
		<category><![CDATA[NetXMS]]></category>
		<category><![CDATA[ntopng]]></category>
		<category><![CDATA[Pandora FMS]]></category>
		<category><![CDATA[PRTG Network Monitor Freeware]]></category>
		<category><![CDATA[Splunk]]></category>
		<category><![CDATA[SysAdmin]]></category>
		<category><![CDATA[The Dude]]></category>
		<category><![CDATA[Total Network Monitor]]></category>
		<category><![CDATA[Wireless Network Watcher]]></category>
		<category><![CDATA[WirelessNetView]]></category>
		<category><![CDATA[Xirrus Wi-Fi Inspector]]></category>
		<category><![CDATA[Xymon]]></category>
		<category><![CDATA[Zenoss Core]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=10677</guid>
		<description><![CDATA[We know how administrators love free tools that make their life easier and, to supplement the list provided on 101 Free Admin Tools, here are 20 of the best free tools for monitoring devices, services, ports or protocols and analysing &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/FBSysAdminWeekday2-3.jpg"><img class="wp-image-10700 alignright" style="margin: 10px; border: 0px solid black;" alt="FBSysAdminWeekday2 (3)" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/FBSysAdminWeekday2-3-300x300.jpg" width="192" height="192" /></a>We know how administrators love free tools that make their life easier and, to supplement the list provided on <b><a href="http://www.gfi.com/blog/101-free-admin-tools/">101 Free Admin Tools</a>, </b>here are 20 of the best free tools for monitoring devices, services, ports or protocols and analysing traffic on your network. Even if you may have heard of some of these tools before, we’re sure you’ll find a gem or two amongst this list – and if you know of any others, leave us a comment below!<span id="more-10677"></span><b></b></p>
<h2>1. <a href="http://www.microsoft.com/en-us/download/details.aspx?id=4865">Microsoft Network Monitor</a></h2>
<p>Microsoft Network Monitor is a packet analyser that allows you to capture, view and analyse network traffic. This tool is handy for troubleshooting network problems and applications on the network. Main features include support for over 300 public and Microsoft proprietary protocols, simultaneous capture sessions, a Wireless Monitor Mode and sniffing of promiscuous mode traffic, amongst others.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/MicrosoftNetworkMonitor.png"><img class="aligncenter size-medium wp-image-10678" alt="MicrosoftNetworkMonitor" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/MicrosoftNetworkMonitor-300x141.png" width="300" height="141" /></a></p>
<p>When you launch Microsoft Network Monitor, choose which adapter to bind to from the main window and then click “New Capture” to initiate a new capture tab. Within the Capture tab, click “Capture Settings” to change filter options, adapter options, or global settings accordingly and then hit “Start” to initiate the packet capture process.</p>
<h2>2. <a href="http://www.nagios.org/download">Nagios</a></h2>
<p>Nagios is a powerful network monitoring tool that helps you to ensure that your critical systems, applications and services are always up and running. It provides features such as alerting, event handling and reporting. The Nagios Core is the heart of the application that contains the core monitoring engine and a basic web UI. On top of the Nagios Core, you are able to implement plugins that will allow you to monitor services, applications, and metrics, a chosen frontend as well as add-ons for data visualisation, graphs, load distribution, and MySQL database support, amongst others.</p>
<p><b>Tip:</b> If you want to try out Nagios without needing to install and configure it from scratch, download Nagios XI and enable the free version. Nagios XI is the pre-configured enterprise class version built upon Nagios Core and is backed by a commercial company that offers support and additional features such as more plugins and advanced reporting.</p>
<p><b>Note:</b> The free version of Nagios XI is ideal for smaller environments and will monitor up to seven nodes.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/NagiosXI.png"><img class="aligncenter size-medium wp-image-10679" alt="NagiosXI" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/NagiosXI-300x274.png" width="300" height="274" /></a></p>
<p>Once you’ve installed and configured Nagios, launch the Web UI and begin to configure host groups and service groups. Once Nagios has had some time to monitor the status of the specified hosts and services, it can start to paint a picture of what the health of your systems look like.</p>
<h2>3. <a href="http://sourceforge.net/projects/bandwidthd/">BandwidthD</a></h2>
<p>BandwidthD monitors TCP/IP network usage and displays the data it has gathered in the form of graphs and tables over different time periods. Each protocol (HTTP, UDP, ICMP, etc) is color-coded for easier reading. BandwidthD runs discretely as a background service.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/bandwidthD.png"><img class="aligncenter size-medium wp-image-10680" alt="bandwidthD" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/bandwidthD-300x280.png" width="300" height="280" /></a></p>
<p>Installation is easy. Download and install Winpcap version 3.0 or above (you’ll already have this installed if you have Wireshark on the same box), unzip BandwidthD to a specified folder, edit the ../etc/bandwidthd.conf file accordingly, double click on the &#8220;Install Service&#8221; batch file and then start the BandwidthD services from the services.msc console. Once the service is running, give it some time to monitor network traffic and load the index.html page to start viewing bandwidth statistics.</p>
<h2>4. <a href="http://nicekit.com/net-monitor/best-free-net-monitor.htm">EasyNetMonitor</a></h2>
<p>EasyNetMonitor is a super lightweight tool for monitoring local and remote hosts to determine if they are alive or not. It is useful for monitoring critical servers from your desktop, allowing you to get immediate notification (via a balloon popup and/or log file) if a host does not respond to a periodic ping.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/EasyNetMonitor1.png"><img class="aligncenter size-full wp-image-10682" alt="EasyNetMonitor" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/EasyNetMonitor1.png" width="282" height="254" /></a></p>
<p>Once you launch EasyNetMonitor, it will appear as an icon in the notification area on your desktop where the IP addresses / host names of the machines you want to monitor can be added. Once you’ve added the machines you wish to monitor, be sure to configure the ping delay time and notification setting.</p>
<h2>5. <a href="http://www.colasoft.com/capsa-free">Capsa Free</a></h2>
<p>Capsa Free is a network analyzer that allows you to monitor network traffic, troubleshoot network issues and analyze packets. Features include support for over 300 network protocols (including the ability to create and customize protocols), MSN and Yahoo Messenger filters, email monitor and auto-save, and customizable reports and dashboards.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/Capsa.png"><img class="aligncenter size-medium wp-image-10683" alt="Capsa" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/Capsa-300x197.png" width="300" height="197" /></a></p>
<p>When you launch Capsa, choose the adapter you want it to bind to and click “Start” to initiate the capture process. Use the tabs in the main window to view the dashboard, a summary of the traffic statistics, the TCP/UDP conversations, as well as packet analysis.</p>
<h2>6. <a href="http://fiddler2.com/home">Fiddler</a></h2>
<p>Fiddler is a web debugging tool that captures HTTP traffic between chosen computers and the Internet. It allows you to analyze incoming and outgoing data to monitor and modify requests and responses before they hit the browser. Fiddler gives you extremely detailed information about HTTP traffic and can be used for testing the performance of your websites or security testing of your web applications (e.g. Fiddler can decrypt HTTPS traffic).</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/Fiddler.png"><img class="aligncenter size-medium wp-image-10684" alt="Fiddler" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/Fiddler-300x169.png" width="300" height="169" /></a></p>
<p>When you launch Fiddler, HTTP traffic will start to be captured automatically. To toggle traffic capturing, hit F12. You can choose which processes you wish to capture HTTP traffic for by clicking on “All Processes” in the bottom status bar, or by dragging the “Any Process” icon from the top menu bar onto an open application.</p>
<h2>7. <a href="http://sourceforge.net/projects/networkminer/">NetworkMiner</a></h2>
<p>NetworkMiner captures network packets and then parses the data to extract files and images, helping you to reconstruct events that a user has taken on the network &#8211; it can also do this by parsing a pre-captured PCAP file. You can enter keywords which will be highlighted as network packets are being captured. NetworkMiner is classed as a Network Forensic Analysis Tool (NFAT) that can obtain information such as hostname, operating system and open ports from hosts.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/NetworkMiner.png"><img class="aligncenter size-medium wp-image-10685" alt="NetworkMiner" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/NetworkMiner-300x153.png" width="300" height="153" /></a></p>
<p>In the example above, I set NetworkMiner to capture packets, opened a web browser and searched for “soccer” as a keyword on Google Images. The images displayed in the Images tab are what I saw during my browser session.</p>
<p>When you load NetworkMiner, choose a network adapter to bind to and hit the “Start” button to initiate the packet capture process.</p>
<h2>8. <a href="http://sourceforge.net/projects/pandora/?source=directory">Pandora FMS</a></h2>
<p>Pandora FMS is a performance monitoring, network monitoring and availability management tool that keeps an eye on servers, applications and communications. It has an advanced event correlation system that allows you to create alerts based on events from different sources and notify administrators before an issue escalates.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/pandorafms.png"><img class="aligncenter size-medium wp-image-10686" alt="pandorafms" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/pandorafms-300x226.png" width="300" height="226" /></a></p>
<p>When you login to the Pandora FMS Web UI, start by going to the ‘Agent detail’ and ‘Services’ node from the left hand navigation pane. From here, you can configure monitoring agents and services.</p>
<h2>9. <a href="http://sourceforge.net/projects/zenoss/">Zenoss Core</a></h2>
<p>Zenoss Core is a powerful open source IT monitoring platform that monitors applications, servers, storage, networking and virtualization to provide availability and performance statistics. It also has a high performance event handling system and an advanced notification system.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/ZenossCore.png"><img class="aligncenter size-medium wp-image-10687" alt="ZenossCore" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/ZenossCore-300x185.png" width="300" height="185" /></a></p>
<p>Once you login to Zenoss Core Web UI for the first time, you are presented with a two-step wizard that asks you to create user accounts and add your first few devices / hosts to monitor. You are then taken directly to the Dashboard tab. Use the Dashboard, Events, Infrastructure, Reports and Advanced tabs to configure Zenoss Core and review reports and events that need attention.</p>
<h2>10. <a href="http://www.paessler.com/prtg">PRTG Network Monitor Freeware</a></h2>
<p>PRTG Network Monitor monitors network availability and network usage using a variety of protocols including SNMP, Netflow and WMI. It is a powerful tool that offers an easy to use web-based interface and apps for iOS and Android. Amongst others, PRTG Network Monitor&#8217;s key features include:</p>
<p>(1) Comprehensive Network Monitoring which offers more than 170 sensor types for application monitoring, virtual server monitoring, SLA monitoring, QoS monitoring</p>
<p>(2) Flexible Alerting, including 9 different notification methods, status alerts, limit alerts, threshold alerts, conditional alerts, and alert scheduling</p>
<p>(3) In-Depth Reporting, including the ability to create reports in HTML/PDF format, scheduled reports, as well as pre-defined reports (e.g. Top 100 Ping Times) and report templates.</p>
<p><b>Note:</b> The Freeware version of PRTG Network Monitor is limited to 10 sensors.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/PRTGNetworkMonitor.png"><img class="aligncenter size-medium wp-image-10688" alt="PRTGNetworkMonitor" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/PRTGNetworkMonitor-300x262.png" width="300" height="262" /></a></p>
<p>When you launch PRTG Network Monitor, head straight to the configuration wizard to get started. This wizard will run you through the main configuration settings required to get the application up and running, including the adding of servers to monitors and which sensors to use.</p>
<h2>11. <a href="http://www.mikrotik.com/thedude">The Dude</a></h2>
<p>The Dude is a network monitoring tool that monitors devices and alerts you when there is a problem. It can also automatically scan all devices on a given subnet and then draw and layout a map of your network.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/TheDude.png"><img class="aligncenter size-medium wp-image-10689" alt="TheDude" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/TheDude-300x174.png" width="300" height="174" /></a></p>
<p>When you launch The Dude, you first choose to connect to a local or remote network and specify credentials accordingly. Click ‘Settings’ to configure options for SNMP, Polling, Syslog and Reports.</p>
<h2>12 <a href="http://www.splunk.com/download">Splunk</a></h2>
<p>Splunk is a data collection and analysis platform that allows you to monitor, gather and analyze data from different sources on your network (e.g. event logs, devices, services, TCP/UDP traffic, etc). You can set up alerts to notify you when something is wrong or use Splunk’s extensive search, reporting and dashboard features to make the most of the collected data. Splunk also allows you to install &#8216;Apps&#8217; to extend system functionality.</p>
<p><b>Note: </b>When you first download and install Splunk, it automatically installs the Enterprise version for you to trial for 60 days before switching to the Free version. To switch to the Free version straight away, go to Manager &gt; Licensing.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/Splunk.png"><img class="aligncenter size-medium wp-image-10690" alt="Splunk" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/Splunk-300x262.png" width="300" height="262" /></a></p>
<p>When you login to the Splunk web UI for the first time, add a data source and configure your indexes to get started. Once you do this you can then create reports, build dashboards, and search and analyze data.</p>
<h2>13. <a href="http://www.angryip.org/w/Download">Angry IP Scanner</a></h2>
<p>Angry IP Scanner is standalone application that facilitates IP address and port scanning. It is used to scan a range of IP addresses to find hosts that are alive and obtain information about them (including MAC address, open ports, hostname, ping time, NetBios information, etc).</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/AngryIpScanner.png"><img class="aligncenter size-medium wp-image-10691" alt="AngryIpScanner" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/AngryIpScanner-300x179.png" width="300" height="179" /></a></p>
<p>When you execute the application, go to Tools &gt; Preferences to configure Scanning and Port options, then go to Tools &gt; Fetchers to choose what information to gather from each scanned IP address.</p>
<h2>14 <a href="http://www.ntop.org/ntop/ntop-is-back-ntopng-1-0-just-released/">ntopng</a></h2>
<p>ntopng (‘ng’ meaning ‘next generation’) is the latest version of the popular network traffic analyzer called ntop. ntopng will sit in the background and gather network traffic, then display network usage information and statistics within a Web UI.</p>
<p><b>Note:</b> Although originally aimed for use on Unix-based systems, there is a Windows version available for a small fee, or a demo version limited to 2000 packets. If you are comfortable running ntopng on a Unix-based box then you can get the full version for free.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/ntopng.png"><img class="aligncenter size-medium wp-image-10692" alt="ntopng" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/ntopng-300x282.png" width="300" height="282" /></a></p>
<p>The image above shows the ntopng dashboard after a few minutes of network traffic collection. In this example, I am using the Windows version. After installation, I simply executed the redis-server.exe file from ..\Program Files (x86)\Redis and fired up the Web UI (http://127.0.0.1:3000).</p>
<h2>15. <a href="http://www.softinventive.com/products/total-network-monitor/">Total Network Monitor</a></h2>
<p>Total Network Monitor continuously monitors hosts and services on the local network, notifying you of any issues that require attention via a detailed report of the problem. The result of each probe is classified using green, red, or black colors to quickly show whether the probe was successful, had a negative result or wasn’t able to complete.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/TotalNetworkMonitor.png"><img class="aligncenter size-medium wp-image-10693" alt="TotalNetworkMonitor" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/TotalNetworkMonitor-300x191.png" width="300" height="191" /></a></p>
<p>When you launch Total Network Monitor, go to Tools &gt; Scan Wizard to have the wizard scan a specified network range automatically and assign the discovered hosts to a group. Alternatively, create a new group manually to start adding devices/hosts individually.</p>
<h2>16. <a href="http://www.netxms.org/download/">NetXMS</a></h2>
<p>NetXMS is a multi-platform network management and monitoring system that offers event management, performance monitoring, alerting, reporting and graphing for the entire IT infrastructure model. NetXMS&#8217;s main features include support for multiple operating systems and database engines, distributed network monitoring, auto-discovery, and business impact analysis tools, amongst others. NetXMS gives you the option to run a web-based interface or a management console.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/NetXMS.png"><img class="aligncenter size-medium wp-image-10694" alt="NetXMS" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/NetXMS-300x185.png" width="300" height="185" /></a></p>
<p>Once you login to NetXMS you need to first go to the “Server Configuration” window to change a few settings that are dependent on your network requirements (e.g. changing the number of data collection handlers or enabling network discovery). You can then run the Network Discovery option for NetXMS to automatically discover devices on your network, or add new nodes by right clicking on “Infrastructure Services” and selecting Tools &gt; Create Node.</p>
<h2>17. <a href="http://sourceforge.net/projects/xymon/">Xymon</a></h2>
<p>Xymon is a web-based system &#8211; designed to run on Unix-based systems &#8211; that allows you to dive deep into the configuration, performance and real-time statistics of your networking environment. It offers monitoring capabilities with historical data, reporting and performance graphs.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/Xymon.png"><img class="aligncenter size-medium wp-image-10695" alt="Xymon" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/Xymon-300x206.png" width="300" height="206" /></a></p>
<p>Once you&#8217;ve installed Xymon, the first place you need to go is the hosts.cfg file to add the hosts that you are going to monitor. Here, you add information such as the host IP address, the network services to be monitored, what URLs to check, and so on.</p>
<p>When you launch the Xymon Web UI, the main page lists the systems and services being monitored by Xymon. Clicking on each system or service allows you to bring up status information about a particular host and then drill down to view specific information such as CPU utilization, memory consumption, RAID status, etc.</p>
<h2>18. <a href="http://www.nirsoft.net/utils/wireless_network_view.html">WirelessNetView</a></h2>
<p>WirelessNetView is a lightweight utility (available as a standalone executable or installation package) that monitors the activity of reachable wireless networks and displays information related to them, such as SSID, Signal Quality, MAC Address, Channel Number, Cipher Algorithm, etc.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/WirelessNetView.png"><img class="aligncenter size-medium wp-image-10696" alt="WirelessNetView" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/WirelessNetView-300x90.png" width="300" height="90" /></a></p>
<p>As soon as you execute WirelessNetView, it automatically populates a list of all reachable Wi-Fi networks in the area and displays information relevant to them (all columns are enabled by default).</p>
<p><b>Note: </b><a href="http://www.nirsoft.net/utils/wireless_network_watcher.html">Wireless Network Watcher</a> is a small utility that goes hand in hand with WirelessNetView. It scans your wireless network and displays a list of all computers and devices that are currently connected, showing information such as IP adddress, MAC address, computer name and NIC card manufacturer – all of which can be exported to a html/xml/csv/txt file.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/WirelessNetworkWatcher.png"><img class="aligncenter size-medium wp-image-10697" alt="WirelessNetworkWatcher" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/WirelessNetworkWatcher-300x134.png" width="300" height="134" /></a></p>
<h2>19. <a href="http://www.xirrus.com/Products/Wi-Fi-Inspector">Xirrus Wi-Fi Inspector</a></h2>
<p>Xirrus Wi-Fi Inspector can be used to search for Wi-Fi networks, manage and troubleshoot connections, verify Wi-Fi coverage, locate Wi-Fi devices and detect rogue Access Points. Xirrus Wi-Fi Inspector comes with built-in connection, quality and speed tests.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/XirrusWiFiInspector.png"><img class="aligncenter size-medium wp-image-10698" alt="XirrusWiFiInspector" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/XirrusWiFiInspector-300x247.png" width="300" height="247" /></a></p>
<p>Once you launch Wi-Fi Inspector and choose an adapter, a list of available Wi-Fi connections is displayed in the “Networks” pane. Details related to your current Wi-Fi connection are displayed in the top right hand corner. Everything pretty much happens from the top ribbon bar – you can run a test, change the layout, edit settings, refresh connections, etc.</p>
<h2>20. <a href="http://www.wireshark.org/download.html">WireShark</a></h2>
<p>This list wouldn’t be complete without the ever popular WireShark. WireShark is an interactive network protocol analyzer and capture utility. It provides for in-depth inspection of hundreds of protocols and runs on multiple platforms.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/WireShark.png"><img class="aligncenter size-medium wp-image-10699" alt="WireShark" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/WireShark-300x182.png" width="300" height="182" /></a></p>
<p>When you launch Wireshark, choose which interface you want to bind to and click the green shark fin icon to get going. Packets will immediately start to be captured. Once you’ve collected what you need, you can export the data to a file for analysis in another application or use the in-built filter to drill down and analyze the captured packets at a deeper level from within Wireshark itself.</p>
<p>Are there any free tools not on this list that you’ve found useful and would like to share with the community? Then leave us a comment below and let us know!</p>
<p><strong><em>Like our posts? Subscribe to our <a href="http://feeds.feedburner.com/TalkTechToMe-All">RSS feed</a> or email feed (on the right hand side) now, and be the first to get them!</em></strong></p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/the-top-20-free-network-monitoring-and-analysis-tools-for-sys-admins/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
		<item>
		<title>SysAdmin Day: We’re Taking it to Another Level!</title>
		<link>http://www.gfi.com/blog/sysadmin-day-were-taking-it-to-another-level/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=sysadmin-day-were-taking-it-to-another-level</link>
		<comments>http://www.gfi.com/blog/sysadmin-day-were-taking-it-to-another-level/#comments</comments>
		<pubDate>Mon, 22 Jul 2013 13:56:42 +0000</pubDate>
		<dc:creator>Christina Goggi</dc:creator>
				<category><![CDATA[Tech Zone]]></category>
		<category><![CDATA[TTTM]]></category>
		<category><![CDATA[free tools]]></category>
		<category><![CDATA[Sys admin]]></category>
		<category><![CDATA[SysAdmin Day]]></category>
		<category><![CDATA[SysAdmin Week]]></category>
		<category><![CDATA[TalkTechToMe]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=10673</guid>
		<description><![CDATA[In case it wasn’t clear enough last year, we love sys admins and SysAdmin Day is very important to us. So we decided to turn SysAdmin Day into SysAdmin Week – because one day is really not enough! Throughout this week, &#8230;]]></description>
				<content:encoded><![CDATA[<p><a style="color: #ff4b33; line-height: 24px; font-size: 16px;" href="http://www.gfi.com/blog/wp-content/uploads/2013/07/FBSysAdminWeekday1.jpg"><img class=" wp-image-10674 alignright" style="margin: 10px; border: 0px solid black;" alt="SysAdminWeekday1" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/FBSysAdminWeekday1-300x300.jpg" width="240" height="240" /></a></p>
<p>In case it wasn’t clear enough <a href="http://www.gfi.com/blog/47-reasons-to-thank-a-sysadmin/">last year</a>, we love sys admins and SysAdmin Day is very important to us.</p>
<p>So we decided to turn SysAdmin Day into SysAdmin Week – because one day is really not enough! Throughout this week, we’ll be publishing a daily post designed specifically for you – from free tools, to tips, tricks of the trade and more (but we can’t divulge any secrets yet).</p>
<p>Stay tuned on our social media pages and TalkTechToMe!</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/sysadmin-day-were-taking-it-to-another-level/feed/</wfw:commentRss>
		<slash:comments>3</slash:comments>
		</item>
		<item>
		<title>Top 5 Free Rescue Discs for Your Sys Admin Toolkit</title>
		<link>http://www.gfi.com/blog/top-5-free-rescue-discs-for-your-sys-admin-toolkit/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=top-5-free-rescue-discs-for-your-sys-admin-toolkit</link>
		<comments>http://www.gfi.com/blog/top-5-free-rescue-discs-for-your-sys-admin-toolkit/#comments</comments>
		<pubDate>Fri, 12 Jul 2013 15:00:08 +0000</pubDate>
		<dc:creator>Andrew Zammit Tabona</dc:creator>
				<category><![CDATA[Tech Zone]]></category>
		<category><![CDATA[TTTM]]></category>
		<category><![CDATA[AVG Rescue CD]]></category>
		<category><![CDATA[Avira AntiVir Rescue System]]></category>
		<category><![CDATA[Boot-Repair-Disk]]></category>
		<category><![CDATA[F-Secure Rescue CD]]></category>
		<category><![CDATA[FalconFour’s Ultimate Boot CD]]></category>
		<category><![CDATA[Hiren Boot CD]]></category>
		<category><![CDATA[Knoppix]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[Linux distribution]]></category>
		<category><![CDATA[Live USB]]></category>
		<category><![CDATA[Master Boot Record]]></category>
		<category><![CDATA[MiniXP]]></category>
		<category><![CDATA[Parted Magic]]></category>
		<category><![CDATA[PuppyLinux]]></category>
		<category><![CDATA[repair tools]]></category>
		<category><![CDATA[Rescue CDs]]></category>
		<category><![CDATA[Rescue Disc]]></category>
		<category><![CDATA[SystemRescueCD]]></category>
		<category><![CDATA[Trinity Rescue Kit]]></category>
		<category><![CDATA[troubleshoot]]></category>
		<category><![CDATA[Ubuntu LiveCD]]></category>
		<category><![CDATA[Ultimate Boot CD]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[Windows System Repair Disc]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=10653</guid>
		<description><![CDATA[A Rescue Disc can be a life saver for a Sys Admin. Packed with various diagnostic and repair tools they can do things like fix a Master Boot Record (MBR), recover a password, detect and clean a rootkit or simply &#8230;]]></description>
				<content:encoded><![CDATA[<p>A Rescue Disc can be a life saver for a Sys Admin. Packed with various diagnostic and repair tools they can do things like fix a Master Boot Record (MBR), recover a password, detect and clean a rootkit or simply allow you to salvage data by transferring it from a damaged drive to another location. Here are the best all-in-one Bootable CD/USBs that admins can use to troubleshoot and repair a Linux or Windows system – all handy additions to your toolkit.</p>
<p><b>1. <a href="http://www.hirensbootcd.org/download/">Hiren Boot CD</a></b><i></i></p>
<p>The tagline for Hiren Boot CD reads “a first aid kit for your computer” &#8211; and that it is! Hiren Boot CD is one of the more popular Rescue CDs out there and contains a wealth of tools including defrag tools, driver tools, backup tools, anti-virus and anti-malware tools, rootkit detection tools, secure data wiping tools, and partitioning tools, amongst others.</p>
<p>Hiren Boot CD is available to download as an ISO for easy installation to a USB or burning to a CD.</p>
<p>The boot menu allows you to boot into the MiniXP environment, the Linux-based rescue environment, run a series of tools or boot directly from a specified partition.</p>
<p style="text-align: center;"><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/Hiren_PreBoot.png"><img class="aligncenter  wp-image-10654" alt="Hiren_PreBoot" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/Hiren_PreBoot.png" width="464" height="243" /></a></p>
<p>The MiniXP environment, as shown in the image below, is much like a Windows XP desktop. Everything pretty much happens from the HBCD Launcher (a standalone application with a drop down menu containing shortcuts to the packaged applications).</p>
<p style="text-align: center;"><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/Hiren_MiniXPBooted.png"><img class="aligncenter  wp-image-10655" alt="Hiren_MiniXPBooted" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/Hiren_MiniXPBooted.png" width="432" height="325" /></a></p>
<p>&nbsp;</p>
<p><b>2. <a href="http://falconfour.wordpress.com/tag/f4ubcd/">FalconFour’s Ultimate Boot CD</a></b></p>
<p>FalconFour’s Ultimate Boot CD is based upon the Hiren Boot CD with a customized boot menu and a whole bunch of updated tools thrown in. F4’s UBCD contains tools that provide system information, tools that recover/repair broken partitions, tools that recover data, as well as file utilities, password recovery tools, network tools, malware removal tools and much more.</p>
<p>F4’s UBCD is available for download as an ISO file so you can burn it to a CD or use it to create a bootable USB drive.</p>
<p>Similar to Hiren Boot CD, when you boot F4’s UBCD you are presented with a menu giving you the option to boot into a Linux environment, the MiniXP environment or run a series of standalone tools. As you scroll through the menu, a description of each item is given at the bottom of the screen.</p>
<p style="text-align: center;"><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/F4UBCD1_PreBoot.png"><img class="aligncenter  wp-image-10656" alt="F4UBCD1_PreBoot" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/F4UBCD1_PreBoot.png" width="406" height="318" /></a></p>
<p>Similar to that of Hiren Boot CD, the MiniXP environment is much like a Windows XP desktop environment, only it’s really lightweight and is pre-packed with a host of diagnostic and repair tools.</p>
<p style="text-align: center;"><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/F4UBCD2_MiniXPBooted.png"><img class="aligncenter  wp-image-10657" alt="F4UBCD2_MiniXPBooted" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/F4UBCD2_MiniXPBooted.png" width="443" height="332" /></a></p>
<p>Once the desktop has loaded up, choose from one of the available application shortcuts, launch the HBCD Menu or go to the Start menu to get going.<i></i></p>
<p>&nbsp;</p>
<p><b>3. <a href="http://www.sysresccd.org/Download">SystemRescueCD</a> </b></p>
<p>SystemRescueCD is a Linux-based package for troubleshooting Linux and Windows systems. The disc contains antivirus, malware removal, and rootkit removal tools as well as tools to help manage or repair partitions, recover your data, back up your data or clone your drives. SystemRescueCD supports ext2/ext3/ext4, reiserfs, btrfs, xfs, jfs, vfat, and ntfs file systems, as well as network file systems like samba and nfs. It also comes with network troubleshooting, file editing, and bootloader restoration tools.</p>
<p>SystemRescueCD is available for download as an ISO file so you can burn it to a CD or use it to create a bootable USB drive.</p>
<p>When you boot the SystemRescueCD, the pre-boot menu gives you a multitude of options, allowing you to boot directly into the graphical environment or the command line.</p>
<p style="text-align: center;"><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/SystemRescueCD1_PreBoot1.png"><img class="aligncenter  wp-image-10659" alt="SystemRescueCD1_PreBoot" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/SystemRescueCD1_PreBoot1.png" width="383" height="287" /></a></p>
<p>In the image below, I have booted into the graphical environment and started the chkrootkit application from the Terminal window which searches for rootkits installed on the system. Other applications can be run directly from the terminal in a similar fashion, using arguments and parameters as necessary.</p>
<p style="text-align: center;"><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/SystemRescueCD1_xstart.png"><img class="aligncenter  wp-image-10660" alt="SystemRescueCD1_xstart" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/SystemRescueCD1_xstart.png" width="433" height="324" /></a></p>
<p>&nbsp;</p>
<p><b>4. <a href="http://www.ultimatebootcd.com/download.html">Ultimate Boot CD</a></b></p>
<p>Ultimate Boot CD is designed to help you troubleshoot Windows and Linux systems using a series of diagnostic and repair tools. It contains anything from data recovery and drive cloning tools to BIOS management, memory and CPU testing tools.</p>
<p>UBCD is downloadable in ISO format for easy installation to a USB or burning to a CD.</p>
<p><b>Note:</b> UBCD4Win (<a href="http://www.ubcd4win.com/">http://www.ubcd4win.com/</a>) is UBCD’s brother built specifically for Windows systems.</p>
<p>When you boot with UBCD you are presented with a DOS-based interface that you navigate depending on which system component you wish to troubleshoot.</p>
<p style="text-align: center;"><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/UBCD_PreBoot.png"><img class="aligncenter  wp-image-10661" alt="UBCD_PreBoot" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/UBCD_PreBoot.png" width="474" height="265" /></a></p>
<p>&nbsp;</p>
<p><b>5. <a href="http://trinityhome.org/Home/index.php?content=TRINITY_RESCUE_KIT_DOWNLOAD">Trinity Rescue Kit</a></b></p>
<p>The Trinity Rescue Kit is a Linux-based Rescue CD aimed specifically at recovery and repair of Windows or Linux machines. It contains a range of tools allowing you to run AV scans, reset lost Windows passwords, backup data, recover data, clone drives, modify partitions and run rootkit detection tools.</p>
<p>The Trinity Rescue Kit is downloadable in ISO format for easy installation to a USB or burning to a CD.</p>
<p>The boot menu gives you the option to start TRK is different modes (useful if you’re having trouble loading in default mode).</p>
<p style="text-align: center;"><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/Trinity_PreBoot.png"><img class="aligncenter  wp-image-10662" alt="Trinity_PreBoot" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/Trinity_PreBoot.png" width="361" height="295" /></a></p>
<p>Once you get to the Trinity Rescue Kit ‘easy menu’, simply navigate through the list to choose which tool to execute. You can also switch to the command line if you want more flexibility and feel comfortable with Linux-based commands.</p>
<p style="text-align: center;"><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/Trinity_EasyBootMenu.png"><img class="aligncenter  wp-image-10663" alt="Trinity_EasyBootMenu" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/Trinity_EasyBootMenu.png" width="435" height="309" /></a></p>
<p>&nbsp;</p>
<h2><b>You may also wish to consider…</b></h2>
<p><a href="http://sourceforge.net/projects/boot-repair-cd/"><b>Boot-Repair-Disk</b></a><b></b></p>
<p>Boot-Repair-Disk is a Rescue CD primarily designed for repairing Linux distributions but can also be used to fix some Windows systems. It automatically launches the Boot-Repair application (a one-click repair system) which is used to repair access to operating systems; providing GRUB reinstallation, MBR restoration, file system repair and UEFI, SecureBoot, RAID, LVM, and Wubi support.</p>
<p><a href="http://partedmagic.com/doku.php?id=downloads"><b>Parted Magic </b></a><br />
<b></b></p>
<p>Parted Magic is a Linux-based bootable disc whose main focus is helping to repair/diagnose drive specific issues. It contains a series of drive management tools such as GParted, GSmartControl, CloneZilla and ms-sys for creating/editing partitions, retrieving drive status information, cloning a drive or managing bootloaders.</p>
<p><a href="http://windows.microsoft.com/en-gb/windows7/create-a-system-repair-disc"><b>Windows System Repair Disc</b></a></p>
<p>The Windows System Repair Disc lets you boot into the Windows Recovery Environment, giving you the option to detect and fix startup and booting issues, restore to a workable restore point (if you had System Restore enabled), restore the entire machine from a backup image, conduct a memory diagnostics test and use the command line to run utilities like chkdsk.</p>
<p>Additionally, Linux distributions such as <a href="http://puppylinux.org/main/Overview%20and%20Getting%20Started.htm"><b>PuppyLinux</b></a>, <a href="https://help.ubuntu.com/community/LiveCD"><b>Ubuntu LiveCD</b></a> or <a href="http://knoppix.net/"><b>Knoppix</b></a> are lightweight bootable versions of Linux that contain a host of handy tools to fix common problems, recover data, transfer data, scan for viruses, manage partitions, etc.</p>
<p>Finally, you could also try a Rescue Disc from a popular Anti-Virus vendor , such as <a href="http://www.avg.com/gb-en/avg-rescue-cd"><b>AVG Rescue CD</b></a>, <a href="http://www.f-secure.com/en/web/labs_global/removal-tools/-/carousel/view/142"><b>F-Secure Rescue CD</b></a>, or <a href="http://www.avira.com/en/download/product/avira-antivir-rescue-system"><b>Avira AntiVir Rescue System</b></a>. Although primarily targeted to help with system’s that are infected with Malware, they are worth adding to your arsenal.</p>
<h2><b>Create your own!</b></h2>
<p>If you want more flexibility, why not create or customize your own bootable rescue disc?</p>
<p>You have a couple of options here:</p>
<p><b>1)      </b><b>Create your own bootable Live USB</b></p>
<p>Using applications such as YUMI (Your Universal Multiboot Installer) or UNetBootin, you can create a multi-boot USB drive containing several operating systems, antivirus utilities, disc cloning, diagnostic tools, and more.</p>
<p><b>2)      </b><b>Modify a Linux distribution</b></p>
<p>If you are using a Linux-based Rescue CD / Live CD, you can use an application like Live-Magic (for Debian-based Linux distributions) or Remastersys to create a bootable ISO of an already installed Linux OS. The idea would be to install a clean build of Linux, add or remove applications and make any customizations as necessary and then run the above mentioned applications to capture the build into an ISO.</p>
<p>Alternatively, instead of using an application, you can use a series of shell scripts to do the same thing. Check out <a href="http://www.linux-live.org/">http://www.linux-live.org/</a> for more information.</p>
<p>So which is your favourite? Have you come across any Rescue CDs not on this list that you’ve found useful and would like to share with the rest of the community?</p>
<p><strong><em>Like our posts? Subscribe to our <a href="http://feeds.feedburner.com/TalkTechToMe-All">RSS feed</a> or email feed (on the right hand side) now, and be the first to get them!</em></strong></p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/top-5-free-rescue-discs-for-your-sys-admin-toolkit/feed/</wfw:commentRss>
		<slash:comments>4</slash:comments>
		</item>
		<item>
		<title>How to Avoid Becoming the Villain (Part 2)</title>
		<link>http://www.gfi.com/blog/how-to-avoid-becoming-the-villain-part-2/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=how-to-avoid-becoming-the-villain-part-2</link>
		<comments>http://www.gfi.com/blog/how-to-avoid-becoming-the-villain-part-2/#comments</comments>
		<pubDate>Tue, 09 Jul 2013 16:37:25 +0000</pubDate>
		<dc:creator>Emmanuel Carabott</dc:creator>
				<category><![CDATA[Tech Zone]]></category>
		<category><![CDATA[TTTM]]></category>
		<category><![CDATA[illicit websites]]></category>
		<category><![CDATA[Search Engine Poisoning]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=10640</guid>
		<description><![CDATA[Life is full of surprises. I recently wrote an article titled How to Avoid Becoming the Villain on why it is so important to configure your servers correctly so that people cannot exploit them for illegal purposes. A few days &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/04/Becoming-the-Villain.jpg"><img class="alignright size-medium wp-image-10454" style="border: 0px solid black; margin: 10px;" alt="Becoming the Villain" src="http://www.gfi.com/blog/wp-content/uploads/2013/04/Becoming-the-Villain-300x200.jpg" width="300" height="200" /></a>Life is full of surprises. I recently wrote an article titled <i><a href="http://www.gfi.com/blog/how-to-avoid-becoming-the-villain/">How to Avoid Becoming the Villain</a></i> on why it is so important to configure your servers correctly so that people cannot exploit them for illegal purposes. A few days ago, I came across a case that adds weight to the points I made then.<span id="more-10640"></span></p>
<p>I was searching for the website of a particular restaurant that provides a delivery service in my area and Google gave me a list including the one that I was looking for. However, the search engine warned me that the website may have been compromised or infected with malware. Now, what would a hungry person working in IT security do in such a situation? Exactly! Forget about food for a little while and look into the matter.</p>
<p>Checking out the webpage source, it was easy to find out what had triggered the alert on Google – this piece of JavaScript:</p>
<p style="padding-left: 30px;">“<i>function xViewState()</i></p>
<p style="padding-left: 30px;"><i>{</i></p>
<p style="padding-left: 30px;"><i>var a=0,m,v,t,z,x=new Array(&#8217;9091968376&#8242;,&#8217;8887918192818786347374918784939277359287883421333333338896&#8242;,</i></p>
<p style="padding-left: 30px;"><i>&#8217;877886888787&#8242;,&#8217;949990793917947998942577939317&#8242;),l=x.length;while(++a&lt;=l){m=x[l-a];</i></p>
<p style="padding-left: 30px;"><i>t=z=&#8221;;</i></p>
<p style="padding-left: 30px;"><i>for(v=0;v&lt;m.length;){t+=m.charAt(v++);</i></p>
<p style="padding-left: 30px;"><i>if(t.length==2){z+=String.fromCharCode(parseInt(t)+25-l+a);</i></p>
<p style="padding-left: 30px;"><i>t=&#8221;;}}x[l-a]=z;} document.write(&#8216;&lt;&#8217;+x[0]+&#8217; &#8216;+x[4]+&#8217;&gt;.&#8217;+x[2]+&#8217;{&#8216;+x[1]+&#8217;}&lt;/&#8217;+x[0]+&#8217;&gt;&#8217;);}</i></p>
<p style="padding-left: 30px;"><i>xViewState();</i></p>
<p style="padding-left: 30px;"><i>&lt;/script</i>&gt;”</p>
<p>&nbsp;</p>
<p>For those with a background in Java, at a first glance you can see that this function is meant to obfuscate some HTML the author of that code didn’t want us, or whoever was to check the code, to know what that HTML code is exactly. Digging a bit deeper, I found that its purpose is to generate the following HTML: <b><i>&lt;undefined style&gt;.nemonn{position:absolute;top:-9999px}&lt;/style&gt;</i></b></p>
<p>The purpose of that HTML is to position a class called .nemonn outside of the screen, making it invisible to anyone visiting the webpage.  What did class nemonn contain? Class nemonn contained adverts and links to sites that sell stuff like medicines, low cost loans and other suspicious offers and deals.</p>
<h2>But why?</h2>
<p>The reason for this attack, which is called Search Engine Poisoning, is so that the attacker can improve the ranking of his malicious sites. Anyone visiting the website will not notice anything out of place, while search engines going through the victim’s website will find all the links that class nemonn is linking to. The search engine will then raise the ranking of those links based on the fact they seem quite popular since other sites are linking back to them.</p>
<p>In a nutshell, attackers are using the popularity of the victim’s site to increase the ranking of their own illicit websites.</p>
<p>This episode highlighted another issue. The attackers were able to gain access to and modify the HTML. The modifications were harmless to people legitimately visiting the webpage but they could also have been used for malware drive by downloads, or to use the website as a platform to launch phishing attacks or include exploits that compromise the user’s machine when visiting the website.</p>
<p>If you work for an organization that hosts any kind of content, be it a website or even files for download, you need to have a process to ensure that none of the content has been modified without authorization. It’s easy to upload data to your website and then forget about it so long as it’s working fine. However, you are taking a number of risks if that data is not protected.</p>
<p>Here’s an example: You have a restaurant’s website that has been compromised by attackers who proceed to manipulate the content. Let’s say that the restaurant had an online shopping cart and facilitated the use of credit cards. All an attacker has to do to steal the credit card details is to write a script that takes the same input as the legitimate form.</p>
<p>This script will save the details including the credit card information and resubmit it to the original script the restaurant is hosting.  This might trigger a warning if the site is hosted on HTTP Secure, but unless the user is tech savvy they are very likely to dismiss the warning especially since everything else will work as expected. Even tech savvy and security conscious users might dismiss the warning as nothing more than a redirect to an unsecure site after the order has been completed, which is something that we often see happen legitimately.</p>
<p>If you don’t want others to turn you into a villain, make sure that no one can make any changes to your site or content. Also, ensure the software products you are using are patched, up-to-date and secure. I was curious to know how the website I was looking for was compromised in the first place. It turned out that they were using an old version of a popular content management system with known vulnerabilities. This is the most likely route the attackers took. The moral of the story is that you should never set up a website and forget about it.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/how-to-avoid-becoming-the-villain-part-2/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Education is Your Only Defence against Shoulder Surfing</title>
		<link>http://www.gfi.com/blog/education-is-your-only-defence-against-shoulder-surfing/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=education-is-your-only-defence-against-shoulder-surfing</link>
		<comments>http://www.gfi.com/blog/education-is-your-only-defence-against-shoulder-surfing/#comments</comments>
		<pubDate>Thu, 04 Jul 2013 14:58:22 +0000</pubDate>
		<dc:creator>Emmanuel Carabott</dc:creator>
				<category><![CDATA[Tech Zone]]></category>
		<category><![CDATA[TTTM]]></category>
		<category><![CDATA[authentication]]></category>
		<category><![CDATA[multi-factor authentication]]></category>
		<category><![CDATA[passwords]]></category>
		<category><![CDATA[shoulder surfing]]></category>
		<category><![CDATA[single-factor authentication]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=10628</guid>
		<description><![CDATA[All the technology products in the world will never protect you against shoulder surfing. Shoulder surfing occurs when someone overhears or sees another person entering their credentials into a system and learns what they are. It has happened to most &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/Shoulder-Surfing1.jpg"><img class=" wp-image-10630 alignright" style="margin: 10px; border: 0px solid black;" alt="Shoulder-Surfing" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/Shoulder-Surfing1-300x200.jpg" width="270" height="180" /></a>All the technology products in the world will never protect you against shoulder surfing. Shoulder surfing occurs when someone overhears or sees another person entering their credentials into a system and learns what they are.</p>
<p>It has happened to most of us and shoulder surfing can be either accidental – you  happen to be next to a colleague and see him or her typing in their passwords – or intentional. When someone is on the lookout for inattentive individuals who log on to their PC or service without paying attention if anyone is looking. Either way, it’s a dangerous situation to be in.<span id="more-10628"></span></p>
<p>I came across a story by <a href="http://www.techdirt.com/articles/20130218/00403422011/dutch-parliament-member-fined-hacking-he-says-he-was-just-exposing-security-flaw.shtml">Techdirt</a> about a politician who was given a password that a member of the public overheard while attending as a patient at a medical laboratory.</p>
<p>The patient didn’t mean any harm and the laboratory should be grateful for that. Imagine what would have happened if those credentials feel into someone who had criminal connections or was involved in data and identify theft. A tech savvy criminal could use the credentials to access and acquire confidential patient files, in turn using the information to steal identities or even blackmail the patients.</p>
<p>Very often people don’t pay attention and do not protect what should be secret and personal. I have seen people typing in their credit card details and not covering the number as they type. People also give their credit cards to serving staff in a restaurant without realizing that their credit card is ‘lost’ for a few minutes. Even airport personnel have a habit of opening doors using the security keypad yet not shielding the numbers from prying eyes.</p>
<p>These things happen because people seldom realize that they have credit cards, passwords and passcodes because they need to protect something by using a secret(s). Pressing a number in an elevator is no different than typing in a passcode or using your credit – that is how some people think. Obviously, it’s not the case and this is why education is so important. Helping people understand what single- and multi-factor authentication is and how it fits into the security paradigm should not be dismissed.</p>
<p>Anybody using technology should learn that when a computer program asks an authorized user for a password it is doing so to ascertain the authorized user’s identity. A computer program doesn’t have eyes that can recognize people so it tries to accomplish this by asking the user a question that only that person should know the answer to, or a password. If other people are aware of that password then the computer cannot distinguish the real authorized user from the others – all the computer is interested in is that the user knows the password and is therefore the authorized user. Anyone who has that password can log in and the computer will accept it because the identity of the user has been authenticated.</p>
<p>The system will continue to accept that identity until the compromised password is invalidated by an administrator. The same thing applies to keypads. The key code to open the door is an alternative to having a guard 24/7 allowing only authorized persons to pass through. The door cannot identify who is standing in front of it unless that person keys in the code which will allow it to determine who it should allow through the door. If a bystander sees the code and keys it in, the door will open because the code is correct and allows the bystander to pass.</p>
<p>The concept behind credit cards is different. Credit cards are assumed to be items that only their legitimate owner has on his or her person. That is why it is very important to never let a credit card out of your sight. Computer systems will always assume that the holder of that credit card is its authorized user. They work on that assumption even if presented with a copy of the credit card rather than an original. Credit cards should be considered as nothing more than portable passwords.</p>
<p>What I have discussed so far is single-factor authentication. It is single-factor because each of the users above uses a single security mechanism. These security mechanisms include either something a person knows (password, pass code) or something a person has (credit card). There is another security mechanism that can be used and that’s based on something a person ‘is’. Something a person ‘is’, is a security factor used in biometrics – a palm print scan or retina scan. To further strengthen security you can use two or all of them at the same time. Two-factor authentication is becoming more popular these days. Credit card users now also have to use a pin code to validate any purchases / withdrawals. Stealing a credit card is useless unless you have the code.</p>
<p>When users understand how authentication methods work, they might be motivated to protect the details more than they currently do. Let’s face it, no one wants someone else to take and use their identity!</p>
<p>When we allow people to overhear or see our credentials, or we give them enough time to take a copy of our credit cards, we are giving them the tools they need to take our identity and use ‘our’ secrets in conjunction with any system that requires them.</p>
<p>If that isn’t motivating enough, then perhaps this will work.</p>
<p>A computer acknowledges a legitimate user if the credentials used are correct; thus if those credentials are misused in any way, it is the legitimate user who will face the music. Querying the system will only show that the ‘person’ who abused the system is the legitimate owner.</p>
<p>A forensic analysis and investigation might clear the victim of any wrongdoing but that would not always be possible in every circumstance. The best way protect your credentials is to keep them secret and always look over your shoulder when keying in passwords. You never know who is looking.</p>
<p><strong><em>Like our posts? Subscribe to our <a href="http://feeds.feedburner.com/TalkTechToMe-All">RSS feed</a> or email feed (on the right hand side) now, and be the first to get them! </em></strong></p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/education-is-your-only-defence-against-shoulder-surfing/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Top 20 Free Disk Tools for SysAdmins</title>
		<link>http://www.gfi.com/blog/top-20-free-disk-tools-for-sysadmins/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=top-20-free-disk-tools-for-sysadmins</link>
		<comments>http://www.gfi.com/blog/top-20-free-disk-tools-for-sysadmins/#comments</comments>
		<pubDate>Wed, 12 Jun 2013 16:00:22 +0000</pubDate>
		<dc:creator>Andrew Zammit Tabona</dc:creator>
				<category><![CDATA[Tech Zone]]></category>
		<category><![CDATA[TTTM]]></category>
		<category><![CDATA[CloneZilla]]></category>
		<category><![CDATA[CrystalDiskInfo]]></category>
		<category><![CDATA[Darik’s Boot And Nuke]]></category>
		<category><![CDATA[DBAN]]></category>
		<category><![CDATA[Defraggler]]></category>
		<category><![CDATA[Disk2vhd]]></category>
		<category><![CDATA[DiskCryptor]]></category>
		<category><![CDATA[GParted]]></category>
		<category><![CDATA[HD Tune]]></category>
		<category><![CDATA[HDDScan]]></category>
		<category><![CDATA[MyDefrag]]></category>
		<category><![CDATA[NTFSWalker]]></category>
		<category><![CDATA[OSFMount]]></category>
		<category><![CDATA[Parted Magic]]></category>
		<category><![CDATA[Recuva]]></category>
		<category><![CDATA[SpeedFan]]></category>
		<category><![CDATA[SSDLife]]></category>
		<category><![CDATA[TestDisk]]></category>
		<category><![CDATA[TreeSize]]></category>
		<category><![CDATA[TrueCrypt]]></category>
		<category><![CDATA[WinDirStat]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=10560</guid>
		<description><![CDATA[Here are 20 of the best free tools for partitioning, cloning, diagnostics, repair, recovery, encryption, wiping or drive information. This list is intended to supplement the list provided on 101 Free SysAdmin Tools. Even if you may have heard of some &#8230;]]></description>
				<content:encoded><![CDATA[<p>Here are 20 of the best free tools for partitioning, cloning, diagnostics, repair, recovery, encryption, wiping or drive information. This list is intended to supplement the list provided on <a href="http://www.gfi.com/blog/101-free-admin-tools/"><i>101 Free SysAdmin Tools</i></a>. Even if you may have heard of some of these tools before, I’m confident that you’ll find a gem or two amongst this list.<span id="more-10560"></span></p>
<h2>1. TestDisk</h2>
<p><a href="http://www.cgsecurity.org/wiki/TestDisk">TestDisk</a> allows you to repair boot sectors, recover deleted partitions, fix damaged partition tables, and recover deleted data, as well as copy files from deleted/inaccessible partitions. It works on a number of different file systems including FAT/NTFS/exFAT/ext2.</p>
<p><b>Note:</b> Bundled with TestDisk is a companion application called PhotoRec. PhotoRec recovers photos, videos and documents from different storage media by going beyond the file system and looking for specific data blocks (i.e. clusters) belonging to the missing file(s).</p>
<p style="text-align: center;"><a href="http://www.gfi.com/blog/wp-content/uploads/2013/06/TestDisk.png"><img class="size-medium wp-image-10561 aligncenter" alt="TestDisk" src="http://www.gfi.com/blog/wp-content/uploads/2013/06/TestDisk-300x195.png" width="300" height="195" /></a></p>
<p>When you first run TestDisk you are asked to choose whether you want a log file to be created. You are then given a list of partition table types to choose from (this will allow the application to use the correct signature when reading the partitions on all available disks), before being presented with a list of available hard drive partitions to perform a selected action on. The choice of actions you can perform on each partition include:</p>
<p>(1)    analysing the partition for the correct structure (and repairing it accordingly if a problem is found)</p>
<p>(2)    changing the disk geometry</p>
<p>(3)    deleting all data in the partition table</p>
<p>(4)    recovering the boot sector</p>
<p>(5)    listing and copying files</p>
<p>(6)    recovering deleted files</p>
<p>(7)    creating an image of the partition</p>
<h2>2. Parted Magic</h2>
<p><a href="http://partedmagic.com/">Parted Magic</a> is a Linux-based bootable CD/USB that contains a series of HDD/SSD disk management tools such as GParted, GSmartControl, Disk Eraser and CloneZilla.<b><br />
</b></p>
<p style="text-align: center;"><a href="http://www.gfi.com/blog/wp-content/uploads/2013/06/PartedMagic.png"><img class="size-medium wp-image-10562 aligncenter" alt="PartedMagic" src="http://www.gfi.com/blog/wp-content/uploads/2013/06/PartedMagic-300x179.png" width="300" height="179" /></a></p>
<p>When you boot the machine using Parted Magic you are presented with a menu asking which GUI version you’d like to load (xvesa or xorg), as well as whether you want to load Parted Magic directly from RAM. Once Parted Magic has loaded, the UI is much like a Linux operating system – all you need to do is select which tool to run and go from there.</p>
<h2><b>3. WinDirStat</b></h2>
<p><b></b><a href="http://windirstat.info/">WinDirStat</a> is a disk usage and clean-up utility that allows you to visualize how data is distributed across a disk and what types of data or which locations are hogging up most space.</p>
<p style="text-align: center;"><a href="http://www.gfi.com/blog/wp-content/uploads/2013/06/WinDirStat.png"><img class="size-medium wp-image-10563 aligncenter" alt="WinDirStat" src="http://www.gfi.com/blog/wp-content/uploads/2013/06/WinDirStat-300x179.png" width="300" height="179" /></a></p>
<p style="text-align: left;">Once you’ve loaded WinDirStat and chosen which drives you’d like to analyse, you are presented with a tree view of the files and folders contained on each drive as well as a graphical representation showing which files are taking up most space. Clicking on a box within the graphic will display the file in question within the tree view on the left hand pane of the window.</p>
<h2 style="text-align: left;"><b>4. CloneZilla</b></h2>
<p style="text-align: left;"><b></b><a href="http://clonezilla.org/">CloneZilla</a> is a disk imaging and cloning tool that is also packaged with Parted Magic but originally available as a standalone tool in two versions; CloneZilla Live and CloneZilla SE (Server Edition). CloneZilla Live is a bootable Linux distribution that allows you to clone individual machines and CloneZilla SE is a package that you install and configure on a Linux distribution that allows you to push images to multiple clients simultaneously over the network.</p>
<p style="text-align: center;"><a href="http://www.gfi.com/blog/wp-content/uploads/2013/06/CloneZilla-Live.png"><img class="size-medium wp-image-10564 aligncenter" alt="CloneZilla-Live" src="http://www.gfi.com/blog/wp-content/uploads/2013/06/CloneZilla-Live-300x224.png" width="300" height="224" /></a></p>
<h2 style="text-align: left;"><b>5. OSFMount</b></h2>
<p style="text-align: left;"><b></b>Using this utility you can mount image files as drive letters and then browse the data directly. <a href="http://www.osforensics.com/tools/mount-disk-images.html">OSFMount</a> supports image files such as DD, ISO, BIN, as well as VMWare Images (*.VMDK) and Nero Burning ROM Images (*.NRG). A neat additional feature of OSFMount is its ability to create RAM disks, useful if you want additional security (since everything within RAM will be flushed when the machine is shutdown) or need to store data that requires fast access times (such as browser cache, database files, etc.).<b><br />
</b></p>
<p style="text-align: center;"><a href="http://www.gfi.com/blog/wp-content/uploads/2013/06/OSFMount.png"><img class="size-medium wp-image-10565 aligncenter" alt="OSFMount" src="http://www.gfi.com/blog/wp-content/uploads/2013/06/OSFMount-300x207.png" width="300" height="207" /></a></p>
<p>After you run OSFMount, go to File &gt; Mount new virtual disk… to get started. Remember to leave “Read-only drive” checked, otherwise you risk overwriting data within the image you’ve just mounted.</p>
<h2 style="text-align: left;"><b>6. Defraggler</b></h2>
<p style="text-align: left;"><b></b><a href="http://www.piriform.com/defraggler">Defraggler</a> is a lightweight yet powerful defragmentation tool that allows you to defrag whole drives or selected files/folders. It has an intuitive interface that helps you to quickly visualize how much of the drive is fragmented and which files are causing most fragmentation.</p>
<p style="text-align: center;"><a href="http://www.gfi.com/blog/wp-content/uploads/2013/06/Defraggler.png"><img class="size-medium wp-image-10566 aligncenter" alt="Defraggler" src="http://www.gfi.com/blog/wp-content/uploads/2013/06/Defraggler-300x258.png" width="300" height="258" /></a></p>
<p>Once you’ve performed an Analysis of the drive, you can use the Drive map to see which files are fragmented. Hover your mouse over a particular square on the map and click on it to display the files associated with that particular colour (e.g. fragmented, not fragmented, etc.).</p>
<h2 style="text-align: left;"><b>7. SSDLife</b></h2>
<p style="text-align: left;"><a href="http://ssd-life.com/eng/download-ssdlife.html">SSDLife</a> displays information about your SSD drive, its health status and estimated lifetime – all useful for helping you to plan ahead and take action accordingly.</p>
<p style="text-align: center;"><a href="http://www.gfi.com/blog/wp-content/uploads/2013/06/SSDLife.png"><img class="size-medium wp-image-10567 aligncenter" alt="SSDLife" src="http://www.gfi.com/blog/wp-content/uploads/2013/06/SSDLife-217x300.png" width="217" height="300" /></a></p>
<p>SSDLife automatically detects the model of your SSD drive and displays information about it instantly upon loading the application.</p>
<p><b>Tip: </b>Each SSD manufacturer should have their own SSD drive management software which gives information similar to SSDLife Free. For example, the “Intel SSD Toolbox” can be used with the SSD shown in the screenshot above to display health status, detailed device information, and estimated life remaining.</p>
<h2 style="text-align: left;"><b>8. Darik’s Boot And Nuke (DBAN)</b></h2>
<p style="text-align: left;"><b></b><a href="http://www.dban.org/">DBAN</a> is a bootable application that forensically wipes hard drives to prevent identity theft. This tool is useful when you are recycling or decommissioning a server/workstation.</p>
<p style="text-align: left;"><a href="http://www.gfi.com/blog/wp-content/uploads/2013/06/DBAN.png"><img class="aligncenter size-medium wp-image-10568" alt="DBAN" src="http://www.gfi.com/blog/wp-content/uploads/2013/06/DBAN-300x167.png" width="300" height="167" /></a></p>
<p>The two main options in DBAN are Interactive mode and Automatic mode. Interactive mode allows you to select which drives to wipe and which options to use when wiping them. Automatic mode will automatically wipe all discovered drives – no questions asked!</p>
<h2 style="text-align: left;"><b>9. HD Tune</b></h2>
<p style="text-align: left;"><b></b><a href="http://www.hdtune.com/index.html">HD Tune</a> can measure the read/write performance of your HDD/SSD, scan for errors, check the health status and display drive information.</p>
<p style="text-align: left;"><a href="http://www.gfi.com/blog/wp-content/uploads/2013/06/HDTune.png"><img class="aligncenter size-medium wp-image-10569" alt="HDTune" src="http://www.gfi.com/blog/wp-content/uploads/2013/06/HDTune-300x240.png" width="300" height="240" /></a></p>
<p>Once you start the application, select the drive from the drop down list and navigate to the appropriate tab to view the information you need or start a scan accordingly.</p>
<h2><b>10. TrueCrypt</b></h2>
<p><b></b><a href="http://www.truecrypt.org/">TrueCrypt</a> is an open-source encryption application that can encrypt entire drives/partitions. It can also create an encrypted volume that appears as a normal file but is only accessible when mounted via TrueCrypt using the provided password. TrueCrypt allows you to select from a list of encryption algorithms that all use a 256-bit key size.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/06/TrueCrypt.png"><img class="aligncenter size-medium wp-image-10570" alt="TrueCrypt" src="http://www.gfi.com/blog/wp-content/uploads/2013/06/TrueCrypt-300x255.png" width="300" height="255" /></a></p>
<p>When you open the TrueCrypt application, select a drive letter and click the “Create Volume” button to get started. This will launch the TrueCrypt Volume Creation Wizard which walks you through the process of encrypting a partition or creating an encrypted container file.</p>
<h2><b>11. CrystalDiskInfo</b></h2>
<p><b></b><a href="http://crystalmark.info/software/CrystalDiskInfo/index-e.html">CrystalDiskInfo</a> is a hard drive health monitoring tool that displays drive information, disk temperature and monitors S.M.A.R.T attributes. CrystalDiskInfo can be configured to trigger an alert (i.e. write to the event log, send an e-mail or make a sound) when a certain threshold is reached, so it can be left to actively monitor the HDD and notify you automatically.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/06/CrystalDiskInfo.png"><img class="aligncenter size-medium wp-image-10571" alt="CrystalDiskInfo" src="http://www.gfi.com/blog/wp-content/uploads/2013/06/CrystalDiskInfo-300x297.png" width="300" height="297" /></a></p>
<p>The bar at the top displays all active hard drives. Clicking on each one will display the information for that drive. The Health Status and Temperature icons change colour depending on their value.</p>
<h2><b>12. Recuva</b></h2>
<p><b></b>In a few simple clicks, <a href="http://www.piriform.com/recuva">Recuva</a> allows you to recover files from your computer that were accidentally deleted or that have become damaged or corrupt. The Quick-Start Wizard walks you through the recovery process by asking a couple of simple questions about what you want to recover and where you want to recover it from and then initiating a quick scan. You can skip the wizard and go straight to the application if you wish.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/06/Recuva.png"><img class="aligncenter size-medium wp-image-10572" alt="Recuva" src="http://www.gfi.com/blog/wp-content/uploads/2013/06/Recuva-300x260.png" width="300" height="260" /></a></p>
<p>From the Recuva interface, select the drive to scan from the drop down box on the left hand side, choose a pre-defined file type filter from the drop down box on the right hand side and then click “Scan” to get started. The filters can be edited to add or remove file types by extension. The Options button allows you to modify options such as enabling a Deep Scan (instead of a Quick Scan), changing the viewing mode, as well as increasing the secure overwriting method (how many times to overwrite a block of data).</p>
<h2><b>13. TreeSize</b></h2>
<p><b></b>An alternative to WinDirStat is a lightweight application called <a href="http://www.jam-software.com/treesize_free/screenshots.shtml">TreeSize</a>. TreeSize quickly scans drives or folders and displays the folder sizes in descending order (by default) to help you pinpoint which folders are taking up most space. The NTFS Compression flag can be enabled directly from within the application.</p>
<p>Once installed, TreeSize can also be started from the context menu by right clicking on a drive or folder and selecting “TreeSize Free” which will automatically open an instance of the application and display the details for that drive or folder.</p>
<p><b>Note: </b>When you have Defraggler, Recuva and TreeSize installed at the same time, you can initiate the Defraggler and Recuva features directly from within TreeSize for a given folder – all three applications integrate seamlessly.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/06/TreeSize.png"><img class="aligncenter size-medium wp-image-10573" alt="TreeSize" src="http://www.gfi.com/blog/wp-content/uploads/2013/06/TreeSize-300x228.png" width="300" height="228" /></a></p>
<p>Using the menu bar or the icons across the taskbar you can select options such as sorting by size or name, showing values in GB/MB/KB, displaying the percentage/file size/file count of the listed folders, and choosing which drives you wish to display details for.</p>
<h2><b>14. HDDScan</b></h2>
<p><b></b><a href="http://www.hddscan.com/">HDDScan</a> is a hard drive diagnostic utility used to test for disk errors, show S.M.A.R.T attributes, monitor disk temperature and perform a read/write benchmark.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/06/HDDSCan.png"><img class="aligncenter size-medium wp-image-10574" alt="HDDSCan" src="http://www.gfi.com/blog/wp-content/uploads/2013/06/HDDSCan-300x180.png" width="300" height="180" /></a></p>
<p>When you launch HDDScan, select the drive you wish to perform an action on from the drop down box on the left. Once selected, click the icon in the middle to get started.</p>
<h2><b>15. Disk2vhd</b></h2>
<p><b></b><a href="http://technet.microsoft.com/en-gb/sysinternals/ee656415">Disk2vhd</a> allows you to create a Virtual Hard Disk (VHD) of a live machine for use with Microsoft Virtual PC or Microsoft Hyper-V. This is a great tool for simulating your live environment within a virtual environment for testing purposes or if you wish to have a virtualized backup of your live environment for redundancy purposes.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/06/Disk2VHD.png"><img class="aligncenter size-medium wp-image-10575" alt="Disk2VHD" src="http://www.gfi.com/blog/wp-content/uploads/2013/06/Disk2VHD-300x237.png" width="300" height="237" /></a></p>
<p>Use of this tool is simple. Choose a name and location for the VHD file to be stored, select which volumes to include and click “Create”. Disk2vhd also has some command line options, allowing you to script the creation of VHD files.</p>
<h2><b>16. NTFSWalker</b></h2>
<p><b></b><a href="http://dmitrybrant.com/ntfswalker">NTFSWalker</a> allows you to perform a low-level analysis of all records (included deleted data) within the MFT table of an NTFS drive. You can examine the properties of each record and extract its contents out to a file.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/06/NTFSWalker.png"><img class="aligncenter size-medium wp-image-10576" alt="NTFSWalker" src="http://www.gfi.com/blog/wp-content/uploads/2013/06/NTFSWalker-300x189.png" width="300" height="189" /></a></p>
<p>When you load NTFSWalker, you are first asked to select a disk to scan. Once you select the disk and confirm which partition you wish to view, the MFT records are displayed on the left hand pane and the details are displayed on the right hand pane. From the right hand pane, you can view the record properties, preview the file or review the contents in raw format (Hex Data).</p>
<h2><b>17. GParted</b></h2>
<p><b></b><a href="http://gparted.sourceforge.net/">GParted</a> is an open-source application for managing partitions. Using GParted you can manipulate partitions (i.e. create, delete, resize, move, copy) and attempt to recover data from lost partitions on a vast amount of file systems.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/06/GParted.png"><img class="aligncenter size-medium wp-image-10577" alt="GParted" src="http://www.gfi.com/blog/wp-content/uploads/2013/06/GParted-300x224.png" width="300" height="224" /></a></p>
<p>GParted comes as a bootable CD which loads a Linux distribution containing the GParted application. When you download the ISO file you will need to burn the image onto a CD or follow the instructions to install it onto a bootable USB drive. When you launch GParted, you are presented with a list of partitions to choose from. Select the desired partition and choose an option to perform by right clicking on it, pressing an icon on the taskbar or navigating to an option on the menu bar.</p>
<h2><b>18. SpeedFan</b></h2>
<p><b></b><a href="http://www.almico.com/speedfan.php">SpeedFan</a> is a useful diagnostic utility that allows you to view details about the health of your machine, including hard disk temperatures and S.M.A.R.T (Self-Monitoring, Analysis and Reporting Technology) attributes.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/06/SpeedFan.png"><img class="aligncenter size-medium wp-image-10578" alt="SpeedFan" src="http://www.gfi.com/blog/wp-content/uploads/2013/06/SpeedFan-260x300.png" width="260" height="300" /></a></p>
<p>When you launch SpeedFan, the main tabs you will use for hard drive information are the Readings tab and the S.M.A.R.T tab. The Clocks tab can be used to compare temperature, voltage or fan speeds between two or more objects.</p>
<h2><b>19. MyDefrag</b></h2>
<p><b></b><a href="http://www.mydefrag.com/">MyDefrag</a> is a disk defragmentation and optimization utility that offers fast performance with little overhead and a number of actions tailored towards different disk uses (e.g. an action specifically for defragging the system disk, an action specifically for defragging flash memory drives, or the ability to only analyse the disk). MyDefrag also allows you to create or customize your own scripts and has a command line version so you can schedule the running of the application at given times.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/06/MyDefrag.png"><img class="aligncenter size-medium wp-image-10579" alt="MyDefrag" src="http://www.gfi.com/blog/wp-content/uploads/2013/06/MyDefrag-300x250.png" width="300" height="250" /></a></p>
<p>When you launch MyDefrag, you are presented with a series of scripts to choose from. Each script performs a given action against the disk(s) chosen from the bottom pane. Once you’ve selected a script and checked the desired disk(s), hit “Run” to initiate the action.</p>
<h2><b>20. DiskCryptor</b></h2>
<p><b></b>An alternative to TrueCrypt is <a href="http://diskcryptor.net/wiki/Main_Page/en">DiskCryptor</a>. DiskCryptor is an easy-to-use open-source application that allows you to encrypt whole partitions using the TwoFish / AES / Serpent algorithms, or a combination of any of the three. DiskCryptor supports FAT12, FAT16, FAT32, NTFS and exFAT file systems, allowing encryption of internal or external drives.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/06/DiskCryptor.png"><img class="aligncenter size-medium wp-image-10580" alt="DiskCryptor" src="http://www.gfi.com/blog/wp-content/uploads/2013/06/DiskCryptor-289x300.png" width="289" height="300" /></a></p>
<p>When you launch DiskCryptor, select a partition and click “Encrypt” to get started. You will then need to select which encryption algorithm to use and will be asked to enter a password. The encryption process will begin as soon as you press “OK”.</p>
<p>Any free tools you know of that are missing from this list? Leave us a comment!</p>
<p><strong><em>Like our posts? Subscribe to our <a href="http://feeds.feedburner.com/TalkTechToMe-All">RSS feed</a> or email feed (on the right hand side) now, and be the first to get them!</em></strong></p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/top-20-free-disk-tools-for-sysadmins/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
		<item>
		<title>The Hidden Security Threat</title>
		<link>http://www.gfi.com/blog/the-hidden-security-threat/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-hidden-security-threat</link>
		<comments>http://www.gfi.com/blog/the-hidden-security-threat/#comments</comments>
		<pubDate>Wed, 29 May 2013 13:16:48 +0000</pubDate>
		<dc:creator>Emmanuel Carabott</dc:creator>
				<category><![CDATA[Tech Zone]]></category>
		<category><![CDATA[TTTM]]></category>
		<category><![CDATA[Critical data]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[device]]></category>
		<category><![CDATA[device security]]></category>
		<category><![CDATA[network security]]></category>
		<category><![CDATA[passwords]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Security Threat]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=10542</guid>
		<description><![CDATA[Although not all stories in the tech press are directly related to security, they often highlight issues that can be excellent educational material. A recent story in The Register about a researcher who wanted to map the Internet caught my &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/05/IP-security.jpg"><img class="alignright  wp-image-10543" style="margin: 10px; border: 0px solid black;" alt="IP security" src="http://www.gfi.com/blog/wp-content/uploads/2013/05/IP-security-300x225.jpg" width="240" height="180" /></a>Although not all stories in the tech press are directly related to security, they often highlight issues that can be excellent educational material. A recent story in <a href="http://www.theregister.co.uk/2013/03/19/carna_botnet_ipv4_internet_map/">The Register</a> about a researcher who wanted to map the Internet caught my attention.</p>
<p>The researcher had a Herculean task to complete: to scan billions of IP addresses using the few computers he had at his disposal. He obviously needed help but where does one find that level of assistance? The researcher gave this some thought and decided to try and exploit insecure systems connected to the Internet. That surely would help.<span id="more-10542"></span></p>
<p>He didn’t access these systems using a complex attack but simply sought to gain access by trying to authenticate two very common user accounts – Root and Admin. He didn’t use a brute force attack but just three passwords: root, admin and a blank entry.</p>
<p>You may think that his attempt had very little success; after all, more and more people know that they should not use insecure passwords, correct? Not only, but most systems will never allow a user to set a blank password. So, really, how effective could this scheme be?</p>
<p>Well it was very effective 420,000 times over!</p>
<p>Many people, including administrators, pay a lot of attention to secure physical machines but generally tend to neglect devices connected to the network. These are a hidden threat too often ignored. Ease-of-use and user-friendly technology have been the driving force behind this.</p>
<p>When you purchase a new device, router, printer and so on, you expect to plug in that device and it works. That’s all it takes. Yet, we often fail to realize that each device can be a small computer system that allows remote access and logging. Nearly all come with default usernames/passwords that users should change once they are deployed. However, this simple step is often skipped because that device is doing what it needs to do out of the box and there is no reason to play around with it.</p>
<p>Just because these devices are working does not mean that they are also secure. Unsecured devices or those running with default usernames and passwords are a gold mine for those with malicious intent. These devices, once connected internally, are a channel to your network and if a hacker can gain access to the device, he or she has gained access to even more systems.</p>
<p>The attackers can run code that can sniff traffic entering and leaving the network; that means they have access to login credentials and any other secrets sent over in plain text. In more advanced attacks, configuration settings on routers, for example, could be changed to redirect traffic through a malicious gateway allowing for man-in-the-middle attacks.</p>
<p>Every new device that is connected to the network should be seen as a possible security threat and the administrator will take it as a must-do task to change the default configuration immediately. This advice is not exclusive to administrators alone. Every computer enthusiast should be aware of the dangers of connecting new devices to their network, even at home. Always read the documentation that comes with the device because it will contain information about its configuration settings and how to change the defaults. Critical data is not only found in a business. Every household computer contains important files and data that would be useful to an attacker. Remember that.</p>
<p><strong><em>Like our posts? Subscribe to our <a href="http://feeds.feedburner.com/TalkTechToMe-All">RSS feed</a> or email feed (on the right hand side) now, and be the first to get them!</em></strong></p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/the-hidden-security-threat/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

 Served from: www.gfi.com @ 2013-08-12 07:04:57 by W3 Total Cache --