Category Archives: Tech Zone
DNS Blacklists: What are they, how do they work and why do we need them?
I would like to talk to you about DNS Blacklists. Most IT Administrators that deal with mail have heard of this term but some components are still unclear. This post aims to clarify these doubts and is split into 3 …
A Look into Insidious Threats – The Logical Bomb
Insidious Threats – Logical Bomb (Emmanuel Carabott) When we think of security we generally get a mental picture of a war against viruses and hackers. The reason for this is that these are by far the most common threats an …
How to create a very strong password
Researchers call for stronger passwords An article on the BBC recently called for people to use stronger passwords in the wake of more computational power available to hackers. We know that security needs to scale as computers become more powerful …
How to identify vulnerabilities in common software products
Vulnerabilities in common software products Mohammed S. Ali 25th August 2010 Large numbers of binary planting vulnerabilities (also known as “dll spoofing” or “dll preloading attacks”) have been discovered in third party applications running on Microsoft Windows platforms. Software companies …
Have Email Archiving needs changed?
Email Archiving has been around for quite a while now and according to a 2009 study (The Radicati Group “E-Mail Archiving Market, 2009-2013“) the market is predicted to grow from $2.1 billion back in 2009 to over $5.1 billion by …
How to Control Cyber Slacking
Cyber slacking is a term used when employees use their work internet connection for personal reasons for excessive amounts of time. Cyber slacking can cause a number of problems, from the obvious loss of productivity to legal liability as well …
How to remove hidden network adapters from virtual machines
When using virtualization on a Microsoft environment such as Hyper-V you can easily have network problems when restoring a Virtual hard drive or changing a network card. With some operating systems on Hyper-V you may notice that the network adapter …
Internet Monitoring: How, what, why?
Monitoring is a vast subject and it is often difficult to think about everything you can monitor; even worse is deciding what is worth the cost of being monitored and what can safely be ignored. To top it all off …
Unbelievable Security Stories
I was reading a story on Reuters about a security expert who highlighted the point that ATMs (Automated Teller Machines) have certain security flaws that help hackers hit the jackpot. Certainly an intriguing story as I thought ATMs were among …
Protect Your Customers and Employees Against Data Theft and Identity Fraud
Security breaches threaten not only your infrastructure and data integrity, but also your standing in the business community and your organization’s very survival. The protection of personally identifiable information (PII) has become a necessity in many areas, mandated via local, …










