Follow GFI:
Find us on Facebook Follow us on Twitter Find us on Linkedin Subscribe to our RSS Feed Find us on YouTube Find us on Google+
 

Category Archives: Tech Zone

Technical info for IT professional and network administrators.

The Ins and Outs of Vulnerability Scanning

The Ins and Outs of Vulnerability Scanning

on February 4, 2011

What are Vulnerability Scanners? Vulnerability scanners check your network against a database of known vulnerabilities; such a database is usually compiled from respectable resources such as CVE (http://cve.mitre.org) or OVAL (http://oval.mitre.org). They can also check for administrative oversights such as …

Read the Full Story
2
6 Tips for a Successful Patching Process

6 Tips for a Successful Patching Process

on January 27, 2011

Whether your servers run Windows or Linux, whether your workstations are Windows 7 or Macs, and no matter what vendor your network gear comes from, one of the most critical administrative tasks for admins of any system is patching. With …

Read the Full Story
3
10 Easy Steps to set up your first Virtual Machine with Hyper-V

10 Easy Steps to set up your first Virtual Machine with Hyper-V

on January 17, 2011

Open up Server Manager and click on ‘Add Roles’. At the ‘Before You Begin’ page, click Next. Select ‘Hyper-V’ from the list of Roles in the ‘Select Server Roles’ page and click Next through the wizard until you get the …

Read the Full Story
0
Did the FBI plant backdoor vulnerabilities in OpenBSD IPSEC?

Did the FBI plant backdoor vulnerabilities in OpenBSD IPSEC?

on January 14, 2011

Recently an interesting story broke out where Theo de Raadt (OpenBSD project Manager) received an email from Gregory Perry, former CTO of NETSEC claiming that about 10 years ago the FBI paid developers working on the IPSEC implementation of OpenBSD …

Read the Full Story
2
Are you being watched?

Are you being watched?

on December 29, 2010

Following a comment by one of our valued readers, Patrick, I decided to write an article about Sniffing because the subject is way too broad to discuss via comments. Patrick mentioned an event which happened recently. A Chinese Telecommunications company …

Read the Full Story
7
5 Benefits of switching to Virtualization Technology

5 Benefits of switching to Virtualization Technology

on December 24, 2010

In today’s world, the main reason why IT organizations are considering virtualization of some, or all, of their computing infrastructures is that the technology helps reduce costs drastically. Consider, for example, the case of the server infrastructure where you would …

Read the Full Story
9
Why can’t I access the DSN I just created?

Why can’t I access the DSN I just created?

on December 20, 2010

The switch to 64 bit was an essential step for computing; however, the bliss of having the extra addressing space was not all that we got unfortunately. The mixture of 32 bit and 64 bit environments has been a source …

Read the Full Story
1
Patching Season?

Patching Season?

on December 16, 2010

The holidays are coming with a large number of security updates releases from vendors. So far this month we already have the following important updates: Google Chrome version 8.0.552.215 was released on 2nd December with 13 security fixes, 4 of …

Read the Full Story
3
Why being Proactive in Security is Essential

Why being Proactive in Security is Essential

on December 9, 2010

We have always been taught that once your system is compromised you need to either restore a clean backup or re-install the system in order to be safe. This is because the person who compromised the machine might have installed …

Read the Full Story
7
5 Popular Hacking Techniques – Do you know your enemies? (Part 2)

5 Popular Hacking Techniques – Do you know your enemies? (Part 2)

on November 30, 2010

Welcome back. In part one, we explained the importance of understanding the threats against your network and looked at three common hacking techniques that the bad guys might use against you. They included Attacking Defaults, SQL Injection, and Exploiting Unpatched …

Read the Full Story
5