Category Archives: Tech Zone
When You Become the Enemy
Malware is distributed in a number of ways. Many web attackers focus their efforts on attracting potential victims to visit malicious sites and, to prevent this from happening, a lot of organizations restrict employee access to reputable sites only. Hackers, …
Is Your Network Being Sniffed? [VIDEO]
Is your network data safe? Do you know if your network traffic is being tracked and recorded by malicious third parties? Most importantly, how would you know if your network is infected and what can you do to prevent it?
57 Simple Sys Admin Mistakes that Someday You’ll Regret
When it comes to IT, simple mistakes can cost you big time. Whether that is immediately or not depends on a number of factors, and sometimes, when something has gone incredibly wrong, you won’t even realize that the root cause …
You’ve got All Your Security Technologies in Place… Now What?
Antivirus and firewall solutions? Check! Regular vulnerability scans and patch management? Check! Web security software? Check! Security thinking? Ch-e…what? When we think about security we automatically think in terms of software. Without a doubt, these solutions are a must to …
Scanning Open Ports in Windows: A Quick Guide
When troubleshooting client or server side application network connectivity issues, it is often necessary to determine if access to a certain port that the application uses is being blocked. In this article we’ll take a quick look at how to …
Security Patching Trends for Major Software Vendors
An important aspect of patch management and your patching schedule is to understand the patch release cycles adopted by the most important software vendors. In this post, we take a look at some statistics on this topic and how patch …
Research: Web Browser War, Security Battle in 2011
No web browser is fully secure and research shows that vulnerabilities in web browsers are a target for hackers and criminals. Patching your browser will reduce the risk of a security breach. And there is good reason why. In 2011, …
The Most Vulnerable Operating Systems and Applications in 2011
As a sys admin, you should try to keep abreast of all the latest and most important security updates for operating systems, applications and so long. Here is an in-depth look at some of the statistics around vulnerabilities that I …
The Ultimate Network Security Checklist
Working on your network security? Check. Want to make sure you have all your bases covered? Check. Need some help getting started? Check. How about a simple list you can follow, broken down by category, which includes some tips and …
How to Protect Your Network against DDoS Attacks
The last thing an administrator wants to deal with is a Distributed Denial of Service (DDoS) attack. Yet, together with the recent rise of hacktivism, DDoS attacks are increasingly becoming a threat that IT admins need to prepared for. Just …









