Category Archives: Tech Zone
How to identify vulnerabilities in common software products
Vulnerabilities in common software products Mohammed S. Ali 25th August 2010 Large numbers of binary planting vulnerabilities (also known as “dll spoofing” or “dll preloading attacks”) have been discovered in third party applications running on Microsoft Windows platforms. Software companies …
Have Email Archiving needs changed?
Email Archiving has been around for quite a while now and according to a 2009 study (The Radicati Group “E-Mail Archiving Market, 2009-2013“) the market is predicted to grow from $2.1 billion back in 2009 to over $5.1 billion by …
How to Control Cyber Slacking
Cyber slacking is a term used when employees use their work internet connection for personal reasons for excessive amounts of time. Cyber slacking can cause a number of problems, from the obvious loss of productivity to legal liability as well …
How to remove hidden network adapters from virtual machines
When using virtualization on a Microsoft environment such as Hyper-V you can easily have network problems when restoring a Virtual hard drive or changing a network card. With some operating systems on Hyper-V you may notice that the network adapter …
Internet Monitoring: How, what, why?
Monitoring is a vast subject and it is often difficult to think about everything you can monitor; even worse is deciding what is worth the cost of being monitored and what can safely be ignored. To top it all off …
Unbelievable Security Stories
I was reading a story on Reuters about a security expert who highlighted the point that ATMs (Automated Teller Machines) have certain security flaws that help hackers hit the jackpot. Certainly an intriguing story as I thought ATMs were among …
Protect Your Customers and Employees Against Data Theft and Identity Fraud
Security breaches threaten not only your infrastructure and data integrity, but also your standing in the business community and your organization’s very survival. The protection of personally identifiable information (PII) has become a necessity in many areas, mandated via local, …
10 Tips to Avoid Spam
Education is an integral part of security. Educating your employees can be an effective defence against attacks; it can also help save money in some cases. Part of your bandwidth costs is consumed by spam and as such educating employees …
Wild Wild West (WWW)
In the past decade the internet has surpassed all expectations and changed the lives of us all. The World Wide Web holds little or no safety for the end user. Very much like the Wild West in the 1800s, the …
How to create a complex and secure backup strategy
Nobody likes to backup, but the reality is that hard drive failure or other types of disaster (natural or not) is something that we need to be prepared for at any time. What better way of being prepared for disaster …









