Category Archives: Tech Zone
5 Popular Hacking Techniques – Do you know your enemies?
“Know your enemy and know yourself and you can fight a hundred battles without disaster.” – Sun Tzu While the famous Chinese general may not have had hacking techniques in mind when he penned The Art of War some 2500 …
5 Benefits of Automating Patch Management
In a previous article I wrote about software patches and why relying on auto updating systems of individual applications is not a practical solution for corporate networks. You need a patch management solution for proper patch management. But what are …
8 Steps to Securing a Public Machine
Mohammed S Ali, wrote an interesting article about the dangers of using public PCs, so to continue with the topic I’ll be explaining what you need to do to secure a machine for public use. 1. Physical Security The first …
Cyber Warfare – Fear is the Real Threat
Lately cyber warfare has become a popular phrase. I’ve come across reports and news items stressing the importance of protecting ourselves against this vicious threat; however, such coined phrases often make the situation sound worse than it is.
Why FAX is still an essential element in corporate environments
Germany is one of the leading countries where fax software in general has been established successfully and is still recognized as essential equipment for running a corporate business. Sending a fax is easy, fast and very cheap. But the great …
5 tips for identifying signs of malware
We all know what a big hassle a malware infection can be. By identifying the symptoms of the malware infection and the means available to clean malware on your PC you can restore the machine to a stable state and …
The Lurking Threats in Free Services
It is a common trend that public institutions such as universities, libraries or similar offices offer free facilities to the public such as providing public computers with internet connection. Generally a USB port is recognized as a standard feature on …
Best Practices for Patch Management
The first item on an administrator’s to-do list is generally patch management. If done incorrectly patch management can be a risk for the organization instead of a risk mitigator. A few simple best practices however easily eliminate all of these …
7 Ways to Monitor your Local Network
Just as with the internet there is plenty to monitor on your local network too. An effective monitoring system can greatly enhance the security of your network by detecting issues before malicious attackers have time to exploit them and by …
How safe is the Internet in reality?
In today’s day and age I would say that this question is relevant and important. When I think back to my past views about the Internet 14 years ago, topics such as “Internet and Web Security” were unknown names to …










