Follow GFI:
Find us on Facebook Follow us on Twitter Find us on Linkedin Subscribe to our RSS Feed Find us on YouTube Find us on Google+
 

Category Archives: Tech Zone

Technical info for IT professional and network administrators.

Cyber Warfare – Fear is the Real Threat

Cyber Warfare – Fear is the Real Threat

on November 16, 2010

Lately cyber warfare has become a popular phrase. I’ve come across reports and news items stressing the importance of protecting ourselves against this vicious threat; however, such coined phrases often make the situation sound worse than it is.

Read the Full Story
13
Why FAX is still an essential element in corporate environments

Why FAX is still an essential element in corporate environments

on November 15, 2010

Germany is one of the leading countries where fax software in general has been established successfully and is still recognized as essential equipment for running a corporate business. Sending a fax is easy, fast and very cheap. But the great …

Read the Full Story
2
5 tips for identifying signs of malware

5 tips for identifying signs of malware

on November 9, 2010

We all know what a big hassle a malware infection can be. By identifying the symptoms of the malware infection and the means available to clean malware on your PC you can restore the machine to a stable state and …

Read the Full Story
13
The Lurking Threats in Free Services

The Lurking Threats in Free Services

on November 8, 2010

It is a common trend that public institutions such as universities, libraries or similar offices offer free facilities to the public such as providing public computers with internet connection. Generally a USB port is recognized as a standard feature on …

Read the Full Story
8
Best Practices for Patch Management

Best Practices for Patch Management

on November 1, 2010

The first item on an administrator’s to-do list is generally patch management. If done incorrectly patch management can be a risk for the organization instead of a risk mitigator. A few simple best practices however easily eliminate all of these …

Read the Full Story
5
7 Ways to Monitor your Local Network

7 Ways to Monitor your Local Network

on October 27, 2010

Just as with the internet there is plenty to monitor on your local network too. An effective monitoring system can greatly enhance the security of your network by detecting issues before malicious attackers have time to exploit them and by …

Read the Full Story
7
How safe is the Internet in reality?

How safe is the Internet in reality?

on October 4, 2010

In today’s day and age I would say that this question is relevant and important. When I think back to my past views about the Internet 14 years ago, topics such as “Internet and Web Security” were unknown names to …

Read the Full Story
5
DNS Blacklists: What are they, how do they work and why do we need them?

DNS Blacklists: What are they, how do they work and why do we need them?

on October 1, 2010

I would like to talk to you about DNS Blacklists. Most IT Administrators that deal with mail have heard of this term but some components are still unclear. This post aims to clarify these doubts and is split into 3 …

Read the Full Story
1
A Look into Insidious Threats – The Logical Bomb

A Look into Insidious Threats – The Logical Bomb

on September 22, 2010

Insidious Threats – Logical Bomb (Emmanuel Carabott) When we think of security we generally get a mental picture of a war against viruses and hackers.  The reason for this is that these are by far the most common threats an …

Read the Full Story
4
How to create a very strong password

How to create a very strong password

on September 15, 2010

Researchers call for stronger passwords An article on the BBC recently called for people to use stronger passwords in the wake of more computational power available to hackers. We know that security needs to scale as computers become more powerful …

Read the Full Story
15