Follow GFI:
Find us on Facebook Follow us on Twitter Find us on Linkedin Subscribe to our RSS Feed Find us on YouTube Find us on Google+
 

Top 20 Free Digital Forensic Investigation Tools for SysAdmins

on September 2, 2013

Here are 20 of the best free tools that will help you conduct a digital forensic investigation. Whether it’s for an internal human resources case, an investigation into unauthorized access to a server, or if you just want to learn …

0
 

ACTA and the Anti Circumvention Clause

on February 16, 2012

This citation concerns you: “Each Party shall provide adequate legal protection and effective legal remedies against the circumvention of effective technological measures that are used by authors, performers or producers of phonograms in connection with exercise of their rights in …

7

5 Ways Valentine’s Day can Cost Your Business

on February 13, 2012

Most businesses look forward to Valentine’s Day as the next big-bucks occasion following the holiday period. People are still reeling from their holiday spends in January, but come mid-February they are ready to pull out the plastic again to spend …

6

VIPRE® Antivirus Business Product Demo and Webcast

on February 10, 2012

Hundreds of thousands worldwide rely on VIPRE Antivirus Business to protect their networks against malware. And just by switching to VIPRE, IT admins in healthcare, education, finance and other industries have made their jobs easier and their organizations safer with …

4

7 Reasons to Consider Cloud Anti-Spam

on February 8, 2012

Why should you consider cloud anti-spam? Spam is a headache for both users and administrators. You know the drill – the company invests in good anti-spam and anti-phishing software hoping to put an end to the unsolicited mail headache. But …

5

15 Great Security Blogs to Check Out!

on February 6, 2012

One of the topics we’re passionate about here at TalkTechToMe is security, and there’s no better way to keep up-to-date and aware of all that is going on than by checking in regularly with our favourite security blogs. We’ve compiled …

9

5 Steps to Protect Exchange Server from Security Attacks

on January 31, 2012

The average IT admin needs to be concerned about a wide range of security threats, such as the prospect of a security breach and denial of service (DOS) attacks. In this post we shall look at five steps admins need …

5

2012 – The End of the World as We Know It?

on January 27, 2012

December 12, 2012 – the day that’s fated to be the ‘end of the world’. Humbug? Whatever your opinion on the Mayan prophecies, there are more important causes for concern this year that should get you brooding – particularly in …

4

3 Tricks to Power Up Exchange Server with PowerShell

on January 25, 2012

Microsoft PowerShell is a powerful task automation framework that consists of a command-line shell and associated scripting language. On its part, the Exchange Management Shell (EMS) is built on Windows PowerShell in order to manage Exchange Server objects. Within EMS, …

2

January Webinar Outlines MSP Marketing Strategy for 2012

on January 23, 2012

Want to get 2012 off to a rousing start and be well informed on the top areas where you should be focusing your marketing strategy this year? We’ve got you covered this January with our FREE webinar. Webinar:  The Top …

2

9 Fundamental Tips for Event Log Management

on January 18, 2012

Are you logging? Do your servers, firewalls, routers, IPS systems, and applications write log files? Good. What are you logging? What do you do with those log files? Do you review them every day? Do you correlate them? Do you …

2