Follow GFI:
Find us on Facebook Follow us on Twitter Find us on Linkedin Subscribe to our RSS Feed Find us on YouTube Find us on Google+
 

Category Archives: Tech Zone

Technical info for IT professional and network administrators.

Undetected Threats: Cloud Storage

Undetected Threats: Cloud Storage

on December 28, 2009

Cloud storage solutions allow users to access their files from virtually anywhere as long as an internet connection is available. The files are stored by the solution providers.  Usually the files stored in the cloud can be accessed via a …

Read the Full Story
0
Protecting your assets using one word – The Password

Protecting your assets using one word – The Password

on December 10, 2009

In a world where a sizable part of any company’s assets or management thereof resides in a computer system, it is more than sensible to expect those systems to be as highly protected as possible. In most cases all the …

Read the Full Story
2
Hacking Devices – USB

Hacking Devices – USB

on December 9, 2009

USB has become a very popular interface over the years. Plenty of devices have been developed that provide a USB interface such as cameras,  phones, music players, the list is endless. While this is a useful technology, some of these …

Read the Full Story
2
Protecting Your Passwords and Confidential Information

Protecting Your Passwords and Confidential Information

on December 4, 2009

Protecting Your Passwords and Confidential information We all know how important a password can be. This is especially true when that password is used on multiple systems. In my past articles I have talked about how to protect one’s passwords …

Read the Full Story
6
Hacking Devices – Ensuring your printer is secure

Hacking Devices – Ensuring your printer is secure

on November 20, 2009

After talking about mobile phones as a threat to your organization we will today discuss yet another device widely in use and that too has the potential of being misused in a way that can compromise your organization. This device …

Read the Full Story
2
Hacking Devices – How to protect yourself from data theft

Hacking Devices – How to protect yourself from data theft

on November 19, 2009

Some time ago I wrote an article about preventing virtual theft – theft of goods from a virtual world (such as a game) by compromising the machine from which you play the game – and loyal reader John Mello pointed …

Read the Full Story
2
How to Delete Windows Patch Install Folders in Vista

How to Delete Windows Patch Install Folders in Vista

on November 12, 2009

After installing Windows Patches the user may find strange looking folders (with names that are hexadecimal numbers, i.e. only letters a-z and 0-9) at the top level of a drive.  Some of these folders are only temporary folders and are …

Read the Full Story
0
compiled from source = bad security practice

compiled from source = bad security practice

on November 6, 2009

Today I saw a ‘how-to’ of what is supposed to be the ‘perfect server‘ setup. Well, the ‘perfect’ was not meant literally, but the setup is in fact very nice – from a functional point of view. Open source is …

Read the Full Story
2
How to prevent Virtual Theft

How to prevent Virtual Theft

on November 5, 2009

We have talked a lot about theft in the real world so I guess it is about time we also discuss theft in virtual world. The BBC reported that some Trojan software are now targeting Online Games and stealing login information …

Read the Full Story
2
Search Engines, Friend or Foe?

Search Engines, Friend or Foe?

on October 30, 2009

Security is all about identifying threats and provisioning for them before your enemy exploits that threat. There are so many vectors to take care of that it truly is a daunting task. Input validation, perimeter control, user education, cryptography, physical …

Read the Full Story
4