Category Archives: Tech Zone
VSS Troubleshooting
The Volume Shadow Copy Service (VSS), part of Microsoft Windows, provides a mechanism to create consistent point-in-time copies of hard-drives and is used by backup applications such as GFI Backup. Further information on how VSS works can be found at …
Playing with processor affinity and Python
Have you ever wondered as to how processor affinity influences a single threaded process on a multiprocessor machine? Well, I have. Today nearly all new machines come with 2 or 4 cores. If you’re lucky, you have an 8 core …
Exploring svchost.exe – Part 3
This is the third post of a three part series in which we explore the world of svchost.exe. In part 1, I introduced the topic of the multiple svchost.exe instances running on Microsoft operating systems; their implied usage; as well …
Awaiting Windows 7 RTM: A MS Windows History memory jog
For a large number of hardcore Windows enthusiasts around the world, today is a big day. Today we are all waiting for the signal from Microsoft that the latest Windows 7 build is signed off and Released to Manufacturing (RTM). …
Exploring svchost.exe – Part 2
This is the second post of a three part series in which we explore the world of svchost.exe. In Part 1, we introduced the multiple svchost.exe instances running on Microsoft operating systems; their implied usage; as well as why it …
Exploring svchost.exe – Part 1
Computer running slower than usual? Most probably an application taking up too many resources. Up goes the task manager to have a look under the hood – nothing strange located in the default list. You click on “Show processes from …
Security and Usability: Finding the Right Balance
Determining the fine line between security and usability is a hard task for everybody involved in IT security, from software developers to network administrators. The lack of balance between these two items is one of the main reasons that can …
21st Century Heists – Part 3
After previously taking a look at the various methods employed to steal money the hi-tech way, below are some considerations, tips and closing thoughts about how to avoid becoming a victim to these schemes. Nowadays a robbery is no longer …
21st Century Heists – Part 2
We previously discussed how robberies and theft used to be carried out in the past and how this has evolved in time. Now we will continue discussing modern ways that malicious people have employed in order to steal money. Skimming …
21st Century Heists – Part 1
The world is evolving. Remember a time when to make a phone call meant having to find the closest pay phone or going home to a landline? How about a time when there was no such thing as a television? …









