Follow GFI:
Find us on Facebook Follow us on Twitter Find us on Linkedin Subscribe to our RSS Feed Find us on YouTube Find us on Google+
 

Category Archives: Tech Zone

Technical info for IT professional and network administrators.

compiled from source = bad security practice

compiled from source = bad security practice

on November 6, 2009

Today I saw a ‘how-to’ of what is supposed to be the ‘perfect server‘ setup. Well, the ‘perfect’ was not meant literally, but the setup is in fact very nice – from a functional point of view. Open source is …

Read the Full Story
2
How to prevent Virtual Theft

How to prevent Virtual Theft

on November 5, 2009

We have talked a lot about theft in the real world so I guess it is about time we also discuss theft in virtual world. The BBC reported that some Trojan software are now targeting Online Games and stealing login information …

Read the Full Story
2
Search Engines, Friend or Foe?

Search Engines, Friend or Foe?

on October 30, 2009

Security is all about identifying threats and provisioning for them before your enemy exploits that threat. There are so many vectors to take care of that it truly is a daunting task. Input validation, perimeter control, user education, cryptography, physical …

Read the Full Story
4
Protecting against Money Theft

Protecting against Money Theft

on October 29, 2009

Time and time again we read stories about malicious people using Trojans to steal money. This time it happened to Cumberland County Redevelopment Authority where, by using a Trojan, a malicious hacker stole nearly half a million dollars.  Brian Krebs …

Read the Full Story
0
Security vs. Productivity in the Workplace

Security vs. Productivity in the Workplace

on October 27, 2009

Conventional wisdom has always told us that when it comes to deciding what users should be allowed to do, the correct choice would be to allow access only to what they need to do, or more accurately, to allow the …

Read the Full Story
0
Copy and Paste is not working on my Remote Desktop Connection… what’s wrong?

Copy and Paste is not working on my Remote Desktop Connection… what’s wrong?

on October 26, 2009

A very annoying occurrence that I sometimes suffer is when all of a sudden the copy and paste function stops working when I am connected to a remote machine. Turns out the problem is coming from a little process called …

Read the Full Story
31
The Dangers of Social Networking

The Dangers of Social Networking

on October 22, 2009

Social sites such as Facebook and MySpace are a big hit nowadays; not just with the young generation but with people of all ages. It’s an amazing platform for people to connect but it certainly isn’t without its dangers. As …

Read the Full Story
6
Into uncharted territory

Into uncharted territory

on October 20, 2009

I decided to go a bit further than usual, and push the limits of the unknown. I decided to install Funtoo, a Gentoo based distro or rather fork, by the Gentoo fouder Daniel Robbins. Daniel is no longer active in …

Read the Full Story
0
Vulnerability Related Standards

Vulnerability Related Standards

on October 13, 2009

Security vulnerabilities in software applications are the most important factor that helps malware to spread. The number of known vulnerabilities is increasing every day. Vulnerability databases like National Vulnerability Database, SecurityFocus or Secunia publish thousands of new vulnerabilities each year. …

Read the Full Story
2
Could Cross Platform be used as a means of redundancy?

Could Cross Platform be used as a means of redundancy?

on October 12, 2009

I came across a story by Nick Farrell of the Inquirer about a case that happened to an Australian Power company. The crux of the story is that a virus infected the company’s infrastructure and was spreading inside the network. …

Read the Full Story
2