Tech Zone

Page 19

Unsolicited Phone Call Scams – Part Two

In Part One, I talk about a phone call scam I received and how I had been passed by the “caller” to a “supervisor”, and then to a “technician”, and how the story just got better and more believable along the way. When it was the technician’s turn, he told me that I had over […]

Continue reading

23 Awesome YouTube Channels for SysAdmins

Killing time should be a piece of cake with all the Internet has to offer – really, it’s inconceivable that you might be at a loss for something to do. That does not mean watching cat videos or playing flash games (that is, unless it’s your thing). If you’re a SysAdmin, or simply a tech […]

Continue reading

Unsolicited Phone Call Scams – Part One

Phone call scams are becoming an epidemic. The phone rings and, upon answering, the caller promptly identifies himself/herself and often claims to work with a prominent organization, such as Microsoft – all of which is bogus. However, some of the craftier callers claim to be from the nearest major computer retailer in your area. The […]

Continue reading

27 Useful Gadgets for SysAdmins

We know sys admins love gadgets, and have therefore compiled a list of some really sweet gadgets, gizmos, tools and other neat stuff that would definitely come in handy. These are tangible devices, not software or websites. So if you’re planning on getting a fellow sys admin a gift or want to add something to […]

Continue reading

Windows Server 2012 – An Overview

Windows Server 2012, the latest addition to the Microsoft Server operating system line up, was launched recently and with all the hype I just had to give it a spin.  In most cases, changes to server operating systems are hidden under the hood, yet this time round Microsoft has changed its interface to the new […]

Continue reading

BYOD – The Good, the Bad and the Ugly

BYOD (Bring Your Own Device) is a term used to describe employees who take their own portable device (e.g. iPhones, iPads and laptops) to the workplace with the intention of accessing firm resources to carry out their everyday jobs. The concept also extends to users who use their own devices for work purposes while out […]

Continue reading

20 Tricky SysAdmin Tasks… And How to Approach Them

A SysAdmin has an almost endless list of tasks they must complete on a regular basis. Some are so routine that they can be done while multitasking, others require careful attention to detail and a laser-like focus to ensure that things are done well and completely. While many admins may look at most of the […]

Continue reading

Keeping Up with the Times

I came across two stories recently that made me wonder what the outcome would be if they were seen in parallel. The first, reported by, showed how, despite being repeatedly told about the importance of security, people seem to block these warnings out and consciously, out of convenience, choose insecure practices.

Continue reading

Windows PowerShell: Extracting Strings Using Regular Expressions

Windows PowerShell is a powerful (no pun intended!) command line scripting language built on top of the .NET framework. Version 2.0 of Windows PowerShell comes installed by default with Windows 7 and Windows 2008 R2. On older platforms, it is available via the Windows Management Framework (which incorporates Windows PowerShell, WinRM and BITS).

Continue reading

Addressing the Exponential Growth in Network Vulnerabilities

The two most common actions after companies had a security incident are patching of vulnerable software (62.3%) and the patching or remediation of vulnerable hardware or infrastructure (49.3%), according to the CSI Computer Crime and Security Survey. Would-be exploiters rely on the fact that there is a window of opportunity between the time the patch […]

Continue reading

Find us on Facebook

Follow us on Twitter