Tech Zone

Page 19

Why FAX is still an essential element in corporate environments

Germany is one of the leading countries where fax software in general has been established successfully and is still recognized as essential equipment for running a corporate business. Sending a fax is easy, fast and very cheap. But the great thing is that fax reports in general have been acknowledged by some major courts in […]

Continue reading

5 tips for identifying signs of malware

We all know what a big hassle a malware infection can be. By identifying the symptoms of the malware infection and the means available to clean malware on your PC you can restore the machine to a stable state and also safe-guard it from any future malware attacks. The following 5 recommendations should go a […]

Continue reading

The Lurking Threats in Free Services

It is a common trend that public institutions such as universities, libraries or similar offices offer free facilities to the public such as providing public computers with internet connection. Generally a USB port is recognized as a standard feature on any computer and public computers are no different. The difference lies in the security implemented […]

Continue reading

Best Practices for Patch Management

The first item on an administrator’s to-do list is generally patch management. If done incorrectly patch management can be a risk for the organization instead of a risk mitigator. A few simple best practices however easily eliminate all of these risks as well as ensure that the process is finished quickly and efficiently.

Continue reading

7 Ways to Monitor your Local Network

Just as with the internet there is plenty to monitor on your local network too. An effective monitoring system can greatly enhance the security of your network by detecting issues before malicious attackers have time to exploit them and by being able to stop a successful attacker before he has time to consolidate his hold. […]

Continue reading

How safe is the Internet in reality?

In today’s day and age I would say that this question is relevant and important. When I think back to my past views about the Internet 14 years ago, topics such as “Internet and Web Security” were unknown names to me. A decade ago the main purpose of the Internet was purely focussed on email […]

Continue reading

DNS Blacklists: What are they, how do they work and why do we need them?

I would like to talk to you about DNS Blacklists. Most IT Administrators that deal with mail have heard of this term but some components are still unclear. This post aims to clarify these doubts and is split into 3 sections: 1) Definition of DNS Blacklists 2) How they work 3) Use of DNSBlacklists. I […]

Continue reading

A Look into Insidious Threats – The Logical Bomb

Insidious Threats – Logical Bomb (Emmanuel Carabott) When we think of security we generally get a mental picture of a war against viruses and hackers.  The reason for this is that these are by far the most common threats an administrator will face; however, it’s important to keep in mind that while common they are […]

Continue reading

How to create a very strong password

Researchers call for stronger passwords An article on the BBC recently called for people to use stronger passwords in the wake of more computational power available to hackers. We know that security needs to scale as computers become more powerful because security is ultimately a numbers game. A hacker needs to guess the correct numbers […]

Continue reading

How to identify vulnerabilities in common software products

Vulnerabilities in common software products Mohammed S. Ali 25th August 2010 Large numbers of binary planting vulnerabilities (also known as “dll spoofing” or “dll preloading attacks”) have been discovered in third party applications running on Microsoft Windows platforms. Software companies are aware of this exploit and are working on a fix for such vulnerabilities in […]

Continue reading

Find us on Facebook

Follow us on Twitter