Follow GFI:
Find us on Facebook Follow us on Twitter Find us on Linkedin Subscribe to our RSS Feed Find us on YouTube Find us on Google+
 

Category Archives: Tech Zone

Technical info for IT professional and network administrators.

Protecting against Money Theft

Protecting against Money Theft

on October 29, 2009

Time and time again we read stories about malicious people using Trojans to steal money. This time it happened to Cumberland County Redevelopment Authority where, by using a Trojan, a malicious hacker stole nearly half a million dollars.  Brian Krebs …

Read the Full Story
0
Security vs. Productivity in the Workplace

Security vs. Productivity in the Workplace

on October 27, 2009

Conventional wisdom has always told us that when it comes to deciding what users should be allowed to do, the correct choice would be to allow access only to what they need to do, or more accurately, to allow the …

Read the Full Story
0
Copy and Paste is not working on my Remote Desktop Connection… what’s wrong?

Copy and Paste is not working on my Remote Desktop Connection… what’s wrong?

on October 26, 2009

A very annoying occurrence that I sometimes suffer is when all of a sudden the copy and paste function stops working when I am connected to a remote machine. Turns out the problem is coming from a little process called …

Read the Full Story
31
The Dangers of Social Networking

The Dangers of Social Networking

on October 22, 2009

Social sites such as Facebook and MySpace are a big hit nowadays; not just with the young generation but with people of all ages. It’s an amazing platform for people to connect but it certainly isn’t without its dangers. As …

Read the Full Story
6
Into uncharted territory

Into uncharted territory

on October 20, 2009

I decided to go a bit further than usual, and push the limits of the unknown. I decided to install Funtoo, a Gentoo based distro or rather fork, by the Gentoo fouder Daniel Robbins. Daniel is no longer active in …

Read the Full Story
0
Vulnerability Related Standards

Vulnerability Related Standards

on October 13, 2009

Security vulnerabilities in software applications are the most important factor that helps malware to spread. The number of known vulnerabilities is increasing every day. Vulnerability databases like National Vulnerability Database, SecurityFocus or Secunia publish thousands of new vulnerabilities each year. …

Read the Full Story
2
Could Cross Platform be used as a means of redundancy?

Could Cross Platform be used as a means of redundancy?

on October 12, 2009

I came across a story by Nick Farrell of the Inquirer about a case that happened to an Australian Power company. The crux of the story is that a virus infected the company’s infrastructure and was spreading inside the network. …

Read the Full Story
2
The SVN recovery story

The SVN recovery story

on October 9, 2009

So it happened that the disk hosting our code repository developed some bad blocks. Must be contagious or something, this is already the third system within a month… I noticed this, when I received some strange messages from cron. Basically …

Read the Full Story
0
Facebook, Facebookhealth and the rogue AntiVirus application

Facebook, Facebookhealth and the rogue AntiVirus application

on October 8, 2009

A mass operation is underway to infect several thousands of computers worldwide. The attack from the malware writers is taking place from various sources using an array of different techniques. Information regarding this attack until now is very limited however …

Read the Full Story
7
Disk failing, what now?

Disk failing, what now?

on October 7, 2009

A disk can, and will, develop bad blocks during its lifetime. Usually the disk firmware is good enough in recognizing failing blocks, before they become unrecoverable and remap them, but nothing is perfect and  problems happens. In that case, where …

Read the Full Story
0