Follow GFI:
Find us on Facebook Follow us on Twitter Find us on Linkedin Subscribe to our RSS Feed Find us on YouTube Find us on Google+
 

Category Archives: Tech Zone

Technical info for IT professional and network administrators.

When You Become the Enemy

When You Become the Enemy

on May 17, 2012

Malware is distributed in a number of ways. Many web attackers focus their efforts on attracting potential victims to visit malicious sites and, to prevent this from happening, a lot of organizations restrict employee access to reputable sites only. Hackers, …

Read the Full Story
4
Is Your Network Being Sniffed? [VIDEO]

Is Your Network Being Sniffed? [VIDEO]

on May 11, 2012

Is your network data safe? Do you know if your network traffic is being tracked and recorded by malicious third parties? Most importantly, how would you know if your network is infected and what can you do to prevent it?

Read the Full Story
3
57 Simple Sys Admin Mistakes that Someday You’ll Regret

57 Simple Sys Admin Mistakes that Someday You’ll Regret

on April 17, 2012

When it comes to IT, simple mistakes can cost you big time. Whether that is immediately or not depends on a number of factors, and sometimes, when something has gone incredibly wrong, you won’t even realize that the root cause …

Read the Full Story
12
You’ve got All Your Security Technologies in Place… Now What?

You’ve got All Your Security Technologies in Place… Now What?

on April 5, 2012

Antivirus and firewall solutions? Check! Regular vulnerability scans and patch management? Check! Web security software? Check! Security thinking? Ch-e…what? When we think about security we automatically think in terms of software. Without a doubt, these solutions are a must to …

Read the Full Story
3
Scanning Open Ports in Windows: A Quick Guide

Scanning Open Ports in Windows: A Quick Guide

on March 15, 2012

When troubleshooting client or server side application network connectivity issues, it is often necessary to determine if access to a certain port that the application uses is being blocked. In this article we’ll take a quick look at how to …

Read the Full Story
5
Security Patching Trends for Major Software Vendors

Security Patching Trends for Major Software Vendors

on March 13, 2012

An important aspect of patch management and your patching schedule is to understand the patch release cycles adopted by the most important software vendors. In this post, we take a look at some statistics on this topic and how patch …

Read the Full Story
3
Research: Web Browser War, Security Battle in 2011

Research: Web Browser War, Security Battle in 2011

on March 5, 2012

No web browser is fully secure and research shows that vulnerabilities in web browsers are a target for hackers and criminals. Patching your browser will reduce the risk of a security breach. And there is good reason why. In 2011, …

Read the Full Story
6
The Most Vulnerable Operating Systems and Applications in 2011

The Most Vulnerable Operating Systems and Applications in 2011

on February 27, 2012

As a sys admin, you should try to keep abreast of all the latest and most important security updates for operating systems, applications and so long. Here is an in-depth look at some of the statistics around vulnerabilities that I …

Read the Full Story
4
The Ultimate Network Security Checklist

The Ultimate Network Security Checklist

on February 24, 2012

Working on your network security? Check. Want to make sure you have all your bases covered? Check. Need some help getting started? Check. How about a simple list you can follow, broken down by category, which includes some tips and …

Read the Full Story
11
How to Protect Your Network against DDoS Attacks

How to Protect Your Network against DDoS Attacks

on February 21, 2012

The last thing an administrator wants to deal with is a Distributed Denial of Service (DDoS) attack. Yet, together with the recent rise of hacktivism,  DDoS attacks are increasingly becoming a threat that IT admins need to prepared for. Just …

Read the Full Story
5