Category Archives: Tech Zone
How Events Monitoring can Prevent IT Disasters (Part 2)
In the first part of this blog post we saw how events monitoring can be a very powerful, effective and at the same time affordable means to prevent system failures in a corporate environment. I believe that the process of …
How Events Monitoring can Prevent IT Disasters (Part 1)
An IT disaster in a corporate environment may cause a significant loss of money and may also interrupt business relevant processes during production. Data loss is one of the worst parts of an IT disaster which sometimes may not be …
Can Companies Defend Against Targeted Attacks? (Part 2)
In the previous post I wrote about the interesting questions raised due to the hacking of IT security firm HBGary. What should we learn from this incident? So, going back to HBGary – why were they apparently so easy to …
Can Companies Defend Against Targeted Attacks? (Part 1)
The story with all the interesting details about how security company HBGary was hacked earlier this month, published by Ars Technica last week, has made quite some noise with people concerned about IT security. It is a perfect – by …
A Quick Look at On-Premise E-mail Archiving
In a previous post, I discussed the concept of e-mail archiving in the cloud and ran through some pros and cons of hosting your e-mail archive off-site. Today we’ll take a quick look at on-premise e-mail archiving. Having an on-premise …
5 Threats to Watch out for when Using a Public Machine
Recently I wrote an article highlighting steps to take if you provide public computer access to your customers to ensure their security. The news then broke out that hardware key loggers were found at public libraries in Manchester. Public libraries …
Top Most Vulnerable Applications and Operating Systems in 2010
Analyzing the data on 2010 from National Vulnerability Database reveals some interesting statistics.
The Ins and Outs of Vulnerability Scanning
What are Vulnerability Scanners? Vulnerability scanners check your network against a database of known vulnerabilities; such a database is usually compiled from respectable resources such as CVE (http://cve.mitre.org) or OVAL (http://oval.mitre.org). They can also check for administrative oversights such as …
6 Tips for a Successful Patching Process
Whether your servers run Windows or Linux, whether your workstations are Windows 7 or Macs, and no matter what vendor your network gear comes from, one of the most critical administrative tasks for admins of any system is patching. With …
10 Easy Steps to set up your first Virtual Machine with Hyper-V
Open up Server Manager and click on ‘Add Roles’. At the ‘Before You Begin’ page, click Next. Select ‘Hyper-V’ from the list of Roles in the ‘Select Server Roles’ page and click Next through the wizard until you get the …









