Follow GFI:
Find us on Facebook Follow us on Twitter Find us on Linkedin Subscribe to our RSS Feed Find us on YouTube Find us on Google+
 

Category Archives: Tech Zone

Technical info for IT professional and network administrators.

VSS Troubleshooting

VSS Troubleshooting

on July 21, 2009

The Volume Shadow Copy Service (VSS), part of Microsoft Windows, provides a mechanism to create consistent point-in-time copies of hard-drives and is used by backup applications such as GFI Backup. Further information on how VSS works can be found at …

Read the Full Story
0
Playing with processor affinity and Python

Playing with processor affinity and Python

on July 20, 2009

Have you ever wondered as to how processor affinity influences a single threaded process on a multiprocessor machine? Well, I have. Today nearly all new machines come with 2 or 4 cores. If you’re lucky, you have an 8 core …

Read the Full Story
1
Exploring svchost.exe – Part 3

Exploring svchost.exe – Part 3

on July 14, 2009

This is the third post of a three part series in which we explore the world of svchost.exe. In part 1, I introduced the topic of the multiple svchost.exe instances running on Microsoft operating systems; their implied usage; as well …

Read the Full Story
0
Awaiting Windows 7 RTM: A MS Windows History memory jog

Awaiting Windows 7 RTM: A MS Windows History memory jog

on July 13, 2009

For a large number of hardcore Windows enthusiasts around the world, today is a big day. Today we are all waiting for the signal from Microsoft that the latest Windows 7 build is signed off and Released to Manufacturing (RTM). …

Read the Full Story
0
Exploring svchost.exe – Part 2

Exploring svchost.exe – Part 2

on July 7, 2009

This is the second post of a three part series in which we explore the world of svchost.exe. In Part 1, we introduced the multiple svchost.exe instances running on Microsoft operating systems; their implied usage; as well as why it …

Read the Full Story
1
Exploring svchost.exe – Part 1

Exploring svchost.exe – Part 1

Computer running slower than usual? Most probably an application taking up too many resources. Up goes the task manager to have a look under the hood – nothing strange located in the default list. You click on “Show processes from …

Read the Full Story
0
Security and Usability: Finding the Right Balance

Security and Usability: Finding the Right Balance

Determining the fine line between security and usability is a hard task for everybody involved in IT security, from software developers to network administrators. The lack of balance between these two items is one of the main reasons that can …

Read the Full Story
0
21st Century Heists – Part 3

21st Century Heists – Part 3

on July 3, 2009

After previously taking a look at the various methods employed to steal money the hi-tech way, below are some considerations, tips and closing thoughts about how to avoid becoming a victim to these schemes. Nowadays a robbery is no longer …

Read the Full Story
0
21st Century Heists – Part 2

21st Century Heists – Part 2

on July 2, 2009

We previously discussed how robberies and theft used to be carried out in the past and how this has evolved in time. Now we will continue discussing modern ways that malicious people have employed in order to steal money. Skimming …

Read the Full Story
0
21st Century Heists – Part 1

21st Century Heists – Part 1

on July 1, 2009

The world is evolving. Remember a time when to make a phone call meant having to find the closest pay phone or going home to a landline?  How about a time when there was no such thing as a television? …

Read the Full Story
0