Tech Zone

Page 19

7 Ways to Monitor your Local Network

Just as with the internet there is plenty to monitor on your local network too. An effective monitoring system can greatly enhance the security of your network by detecting issues before malicious attackers have time to exploit them and by being able to stop a successful attacker before he has time to consolidate his hold. […]

Continue reading

How safe is the Internet in reality?

In today’s day and age I would say that this question is relevant and important. When I think back to my past views about the Internet 14 years ago, topics such as “Internet and Web Security” were unknown names to me. A decade ago the main purpose of the Internet was purely focussed on email […]

Continue reading

DNS Blacklists: What are they, how do they work and why do we need them?

I would like to talk to you about DNS Blacklists. Most IT Administrators that deal with mail have heard of this term but some components are still unclear. This post aims to clarify these doubts and is split into 3 sections: 1) Definition of DNS Blacklists 2) How they work 3) Use of DNSBlacklists. I […]

Continue reading

A Look into Insidious Threats – The Logical Bomb

Insidious Threats – Logical Bomb (Emmanuel Carabott) When we think of security we generally get a mental picture of a war against viruses and hackers.  The reason for this is that these are by far the most common threats an administrator will face; however, it’s important to keep in mind that while common they are […]

Continue reading

How to create a very strong password

Researchers call for stronger passwords An article on the BBC recently called for people to use stronger passwords in the wake of more computational power available to hackers. We know that security needs to scale as computers become more powerful because security is ultimately a numbers game. A hacker needs to guess the correct numbers […]

Continue reading

How to identify vulnerabilities in common software products

Vulnerabilities in common software products Mohammed S. Ali 25th August 2010 Large numbers of binary planting vulnerabilities (also known as “dll spoofing” or “dll preloading attacks”) have been discovered in third party applications running on Microsoft Windows platforms. Software companies are aware of this exploit and are working on a fix for such vulnerabilities in […]

Continue reading

Have Email Archiving needs changed?

Email Archiving has been around for quite a while now and according to a 2009 study (The Radicati Group “E-Mail Archiving Market, 2009-2013“) the market is predicted to grow from $2.1 billion back in 2009 to over $5.1 billion by 2013. The IT landscape has changed significantly since the first Email Archiving solutions emerged and […]

Continue reading

How to Control Cyber Slacking

Cyber slacking is a term used when employees use their work internet connection for personal reasons for excessive amounts of time. Cyber slacking can cause a number of problems, from the obvious loss of productivity to legal liability as well as virus infection. Employees browsing the web during working hours are not just a productivity […]

Continue reading

How to remove hidden network adapters from virtual machines

When using virtualization on a Microsoft environment such as Hyper-V you can easily have network problems when restoring a Virtual hard drive or changing a network card. With some operating systems on Hyper-V you may notice that the network adapter “MS Virtual Machine Bus Network Adapter” name changes and a number is associated with it, […]

Continue reading

Internet Monitoring: How, what, why?

Monitoring is a vast subject and it is often difficult to think about everything you can monitor; even worse is deciding what is worth the cost of being monitored and what can safely be ignored.  To top it all off there are so many media that a company can monitor that it’s a huge task […]

Continue reading

Find us on Facebook

Follow us on Twitter