Follow GFI:
Find us on Facebook Follow us on Twitter Find us on Linkedin Subscribe to our RSS Feed Find us on YouTube Find us on Google+
 

Category Archives: Tech Zone

Technical info for IT professional and network administrators.

5 Popular Hacking Techniques – Do you know your enemies?

5 Popular Hacking Techniques – Do you know your enemies?

on November 29, 2010

“Know your enemy and know yourself and you can fight a hundred battles without disaster.” – Sun Tzu While the famous Chinese general may not have had hacking techniques in mind when he penned The Art of War some 2500 …

Read the Full Story
7
5 Benefits of Automating Patch Management

5 Benefits of Automating Patch Management

on November 25, 2010

In a previous article I wrote about software patches and why relying on auto updating systems of individual applications is not a practical solution for corporate networks. You need a patch management solution for proper patch management. But what are …

Read the Full Story
5
8 Steps to Securing a Public Machine

8 Steps to Securing a Public Machine

on November 23, 2010

Mohammed S Ali, wrote an interesting article about the dangers of using public PCs, so to continue with the topic I’ll be explaining what you need to do to secure a machine for public use. 1. Physical Security The first …

Read the Full Story
5
Cyber Warfare – Fear is the Real Threat

Cyber Warfare – Fear is the Real Threat

on November 16, 2010

Lately cyber warfare has become a popular phrase. I’ve come across reports and news items stressing the importance of protecting ourselves against this vicious threat; however, such coined phrases often make the situation sound worse than it is.

Read the Full Story
13
Why FAX is still an essential element in corporate environments

Why FAX is still an essential element in corporate environments

on November 15, 2010

Germany is one of the leading countries where fax software in general has been established successfully and is still recognized as essential equipment for running a corporate business. Sending a fax is easy, fast and very cheap. But the great …

Read the Full Story
2
5 tips for identifying signs of malware

5 tips for identifying signs of malware

on November 9, 2010

We all know what a big hassle a malware infection can be. By identifying the symptoms of the malware infection and the means available to clean malware on your PC you can restore the machine to a stable state and …

Read the Full Story
13
The Lurking Threats in Free Services

The Lurking Threats in Free Services

on November 8, 2010

It is a common trend that public institutions such as universities, libraries or similar offices offer free facilities to the public such as providing public computers with internet connection. Generally a USB port is recognized as a standard feature on …

Read the Full Story
8
Best Practices for Patch Management

Best Practices for Patch Management

on November 1, 2010

The first item on an administrator’s to-do list is generally patch management. If done incorrectly patch management can be a risk for the organization instead of a risk mitigator. A few simple best practices however easily eliminate all of these …

Read the Full Story
5
7 Ways to Monitor your Local Network

7 Ways to Monitor your Local Network

on October 27, 2010

Just as with the internet there is plenty to monitor on your local network too. An effective monitoring system can greatly enhance the security of your network by detecting issues before malicious attackers have time to exploit them and by …

Read the Full Story
7
How safe is the Internet in reality?

How safe is the Internet in reality?

on October 4, 2010

In today’s day and age I would say that this question is relevant and important. When I think back to my past views about the Internet 14 years ago, topics such as “Internet and Web Security” were unknown names to …

Read the Full Story
5