Category Archives: Tech Zone
Hacking Motivations – Hacktivism
Hacktivism is a term which describes the use of hacking for political, non-violent activism. As with any other form of activism, people’s perceptions will differ; some see hacktivism as a necessary tool against oppression, while others see it as nothing …
101 Free Admin Tools
We know administrators love tools that make life easier – especially when they’re free! So here are 101 of them! Any free tools you know of that are missing from this list? Leave us a comment! We know administrators love …
How to limit Internet access on the network
There are several reasons why you need to limit Internet access on the network. Perhaps your company is experiencing a problem with individuals’ productivity. Or Human Resources has determined that there is an issue with certain employees’ web access. Maybe …
SPAM e-Mails: Bringing You Excitement Since 1978
Spam is a pain to deal with. It clogs up your mailbox, brings down mail servers, and can harbor viruses and malware. As much of a hassle spam is to deal with, at least it brings the promise of excitement …
Monitoring Internet Usage in the Workplace
Most employees require full Internet connectivity in order to work productively. Opening the Internet to employees can come at a large cost however – if Internet usage is not monitored, employees can make bad use of it to the detriment …
The Importance of Deploying a Patch Management Process
Patching systems is often seen as a simple task but there is more to the patch management process than meets the eye. You don’t just get the patches and deploy them but you need to start planning and testing before …
What Should Be Included In Your Patch Management Policy?
Most organizations pay attention to security and patching their systems, but how many have a well-honed patch management policy? Patch management is often seen as a trivial task. Simply click on ‘update’ and that’s it. But in reality there is …
Why your organization needs to do network auditing
Network auditing is a must for any organization. Networks are dynamic entities; they grow, shrink, change and divide themselves continuously. Network administrators cannot even assume this process is entirely under their control. Users add devices and sometimes even new hardware …
Why You Need to Run a Vulnerability Assessment
Running a vulnerability assessment is fundamental for any organization. When an administrator is in the process of securing his network, there are a lot of things he needs to bear in mind. Unfortunately, when it comes to network security most …
Beware the Malware Banner
Have you already heard about the banner trick? Not yet? This is one of the latest sophisticated additions found in the Zeus malware configuration. This addition has been recently discovered, analyzed and reported by Trusteer. Malware such as Zeus place …










