Follow GFI:
Find us on Facebook Follow us on Twitter Find us on Linkedin Subscribe to our RSS Feed Find us on YouTube Find us on Google+
 

Category Archives: Tech Zone

Technical info for IT professional and network administrators.

5 Reasons Why IT Asset Tracking Is Important

5 Reasons Why IT Asset Tracking Is Important

on July 23, 2012

As networks grow and more assets are added, it is easy to lose track of what you have and where those assets are. It can become more confusing if you have multiple offices. Gaining insight into the hardware that rests …

Read the Full Story
0
A Network Manager’s Prized Tool

A Network Manager’s Prized Tool

on July 13, 2012

IT admins, more often than not, have a myriad of tasks to perform on a daily basis. Often the sole warriors in the business, they must keep systems running, incorporate requested changes into the network and deal with a number …

Read the Full Story
2
5 Ways to Remotely Manage Your Exchange Server

5 Ways to Remotely Manage Your Exchange Server

on July 11, 2012

It is two o’clock in the morning and your phone rings to tell you the server crashed, or there is some other problem that requires a trip back to the office or data center in the middle of the night. …

Read the Full Story
2
The Top 89 Admin Pet Peeves

The Top 89 Admin Pet Peeves

on June 29, 2012

Pet peeves, annoyances, irritations, grievances, vexations…if you are an IT admin, I bet you have a few. We all do. There are just some things that can set one admin off on a wild tear, while others go on nonplussed. …

Read the Full Story
14
10 of the Most Dangerous Things to Have on Your Network

10 of the Most Dangerous Things to Have on Your Network

on June 25, 2012

They say the road to hell is paved with good intentions – any sys admin would relate to this.  You have nothing but the best intentions when you install a tool, set up a service, or plug in a device …

Read the Full Story
4
Malware Headlines Make Case for Sandbox

Malware Headlines Make Case for Sandbox

on June 6, 2012

With The New York Times recently reporting on the origins of Stuxnet and all the commentary and speculation on the incredibly sophisticated Flame malware, some interesting questions are being raised by my colleagues in the security industry and the journalists covering …

Read the Full Story
4
The Hidden Threat behind Web Banners [VIDEO]

The Hidden Threat behind Web Banners [VIDEO]

on June 1, 2012

Advertising builds trust in a brand, and that trust makes us feel secure enough to click on a banner ad of a brand we know while browsing the Internet. However, danger could lurk here in the form of “malvertising”.

Read the Full Story
1
Nine Great Cloud Anti-Spam Blogs to Check Out

Nine Great Cloud Anti-Spam Blogs to Check Out

on May 30, 2012

Are you a system admin or an IT junkie looking for the latest updates and tips in the cloud computing sphere? We have listed nine great blogs, each with its own focus on cloud computing, which make for some great …

Read the Full Story
3
Is Exchange Anti-Spam Enough?

Is Exchange Anti-Spam Enough?

on May 23, 2012

We all know the importance of network security, yet it is also necessary to strike a balance between its costs and its benefits. This is not easy and there is no golden rule here, with the golden ratio being different …

Read the Full Story
5
111 Windows Tips to Help You Put Nine Hours into an Eight-Hour Day

111 Windows Tips to Help You Put Nine Hours into an Eight-Hour Day

on May 21, 2012

Is this you: Eat lunch at your desk because you don’t have time to go out? Can’t stop for five minutes to chat at the coffee machine? Wear your wireless headset into the restroom because conference calls and biological necessities …

Read the Full Story
3