Follow GFI:
Find us on Facebook Follow us on Twitter Find us on Linkedin Subscribe to our RSS Feed Find us on YouTube Find us on Google+
 

Category Archives: Tech Zone

Technical info for IT professional and network administrators.

SPAM e-Mails: Bringing You Excitement Since 1978

SPAM e-Mails: Bringing You Excitement Since 1978

on July 1, 2011

Spam is a pain to deal with. It clogs up your mailbox, brings down mail servers, and can harbor viruses and malware. As much of a hassle spam is to deal with, at least it brings the promise of excitement …

Read the Full Story
4
Monitoring Internet Usage in the Workplace

Monitoring Internet Usage in the Workplace

on June 9, 2011

Most employees require full Internet connectivity in order to work productively. Opening the Internet to employees can come at a large cost however – if Internet usage is not monitored, employees can make bad use of it to the detriment …

Read the Full Story
5
The Importance of Deploying a Patch Management Process

The Importance of Deploying a Patch Management Process

on June 3, 2011

Patching systems is often seen as a simple task but there is more to the patch management process than meets the eye. You don’t just get the patches and deploy them but you need to start planning and testing before …

Read the Full Story
4
What Should Be Included In Your Patch Management Policy?

What Should Be Included In Your Patch Management Policy?

on June 2, 2011

Most organizations pay attention to security and patching their systems, but how many have a well-honed patch management policy? Patch management is often seen as a trivial task. Simply click on ‘update’ and that’s it. But in reality there is …

Read the Full Story
3
Why your organization needs to do network auditing

Why your organization needs to do network auditing

on June 1, 2011

Network auditing is a must for any organization. Networks are dynamic entities; they grow, shrink, change and divide themselves continuously. Network administrators cannot even assume this process is entirely under their control. Users add devices and sometimes even new hardware …

Read the Full Story
6
Why You Need to Run a Vulnerability Assessment

Why You Need to Run a Vulnerability Assessment

on May 31, 2011

Running a vulnerability assessment is fundamental for any organization. When an administrator is in the process of securing his network, there are a lot of things he needs to bear in mind. Unfortunately, when it comes to network security most …

Read the Full Story
10
Beware the Malware Banner

Beware the Malware Banner

on May 24, 2011

Have you already heard about the banner trick? Not yet? This is one of the latest sophisticated additions found in the Zeus malware configuration. This addition has been recently discovered, analyzed and reported by Trusteer. Malware such as Zeus place …

Read the Full Story
4
Tips for a Good Patch Management Strategy

Tips for a Good Patch Management Strategy

on May 20, 2011

Previously “Never touch a running system” was a very common tradition/saying in IT administration. Once software is installed on a system, it will be never touched again as long as software does the job properly. Nowadays, this common tradition has …

Read the Full Story
4
PST Recovery: An Overview

PST Recovery: An Overview

on May 4, 2011

PST recovery is often needed by administrators for a number of reasons; to name a few, it can happen because of Outlook crashes, sudden machine shutdowns and when the PST file grows too large. This usually means the administrator will …

Read the Full Story
4
The 16 Most (Potentially) Dangerous Applications on your Network

The 16 Most (Potentially) Dangerous Applications on your Network

on May 2, 2011

System admins know the importance of keeping up with operating systems patches on their workstations and servers, and making sure their antivirus definitions are kept up to date. We plan for and test regularly Microsoft’s monthly releases, and ensure 100% …

Read the Full Story
10