Category Archives: Tech Zone
Windows PowerShell: Extracting Strings Using Regular Expressions
Windows PowerShell is a powerful (no pun intended!) command line scripting language built on top of the .NET framework. Version 2.0 of Windows PowerShell comes installed by default with Windows 7 and Windows 2008 R2. On older platforms, it is …
Addressing the Exponential Growth in Network Vulnerabilities
The two most common actions after companies had a security incident are patching of vulnerable software (62.3%) and the patching or remediation of vulnerable hardware or infrastructure (49.3%), according to the CSI Computer Crime and Security Survey. Would-be exploiters rely …
47 Reasons to Thank a SysAdmin
Happy SysAdmins Day! Around the world, the last Friday in July is known (at least by some) as SysAdmin Day. The idea is that on this day, we show our appreciation to SysAdmins for the tireless, never-ending work that they …
5 Reasons Why IT Asset Tracking Is Important
As networks grow and more assets are added, it is easy to lose track of what you have and where those assets are. It can become more confusing if you have multiple offices. Gaining insight into the hardware that rests …
A Network Manager’s Prized Tool
IT admins, more often than not, have a myriad of tasks to perform on a daily basis. Often the sole warriors in the business, they must keep systems running, incorporate requested changes into the network and deal with a number …
5 Ways to Remotely Manage Your Exchange Server
It is two o’clock in the morning and your phone rings to tell you the server crashed, or there is some other problem that requires a trip back to the office or data center in the middle of the night. …
The Top 89 Admin Pet Peeves
Pet peeves, annoyances, irritations, grievances, vexations…if you are an IT admin, I bet you have a few. We all do. There are just some things that can set one admin off on a wild tear, while others go on nonplussed. …
10 of the Most Dangerous Things to Have on Your Network
They say the road to hell is paved with good intentions – any sys admin would relate to this. You have nothing but the best intentions when you install a tool, set up a service, or plug in a device …
Malware Headlines Make Case for Sandbox
With The New York Times recently reporting on the origins of Stuxnet and all the commentary and speculation on the incredibly sophisticated Flame malware, some interesting questions are being raised by my colleagues in the security industry and the journalists covering …
The Hidden Threat behind Web Banners [VIDEO]
Advertising builds trust in a brand, and that trust makes us feel secure enough to click on a banner ad of a brand we know while browsing the Internet. However, danger could lurk here in the form of “malvertising”.










