Category Archives: Tech Zone
Education is Your Only Defence against Shoulder Surfing
All the technology products in the world will never protect you against shoulder surfing. Shoulder surfing occurs when someone overhears or sees another person entering their credentials into a system and learns what they are. It has happened to most …
Top 20 Free Disk Tools for SysAdmins
Here are 20 of the best free tools for partitioning, cloning, diagnostics, repair, recovery, encryption, wiping or drive information. This list is intended to supplement the list provided on 101 Free SysAdmin Tools. Even if you may have heard of some …
The Hidden Security Threat
Although not all stories in the tech press are directly related to security, they often highlight issues that can be excellent educational material. A recent story in The Register about a researcher who wanted to map the Internet caught my …
Advanced Persistent Threat (APT) – A Hyped up Marketing Term or a Security Concern?
It is not uncommon for marketing teams or advertising agencies to take a current IT ‘buzzword’ and use it as part of their campaign to promote a new product or service. Advanced Persistent Threat (APT) is one of those buzzwords. …
How to Avoid Becoming the Villain
Computing history has shown us that if you are running servers you are responsible for your own infrastructure and in some cases, also responsible towards those using the Internet. Malicious attacks illegally exploiting poorly configured servers were common practice until …
Hear! Hear! Tips from THE IT Security Experts
We all have our take on IT security, and if you’re reading this post it means you want to hear more. So do we, that’s why we have reached out to some well-known IT experts in the security blogosphere and …
Eight Stealth IT Technologies that Can Cause You Problems, and 10 Things You Can Do About It
As I was flying home from a customer engagement, I looked down from the window of the airplane to see all the clouds floating lazily below me. It was not a completely overcast day, so I could easily see the …
13 for ’13 Jumpstart: Upgrades
A few weeks ago we published an article called 13 IT Projects to Include in Your Plans for 2013 in which we suggested 13 great IT projects for you to consider; we decided to publish some follow-up articles to help …
Report: The Most Vulnerable Operating Systems and Applications in 2012
Vulnerabilities in software and operating systems remain a thorn in the side for administrators around the world. A single vulnerability exploited by the bad guys can bring a company to its knees. Maintaining patched systems is a must in today’s …
13 for ’13 Jumpstart: Multifactor Authentication
A few weeks ago we published an article called 13 IT Projects to Include in Your Plans for 2013. In that post, we suggested 13 great IT projects for you to consider. We decided to publish some follow-up articles to …










