Here are 20 of the best free tools that will help you conduct a digital forensic investigation. Whether it’s for an internal human resources case, an investigation into unauthorized access to a server, or if you just want to learn …
GFI Labs Blog, the research and information security news hub of GFI Software, is now part of the GFI domain. Formerly known as the Sunbelt Labs Blog, it is one of the industry’s go-to portals for security enthusiasts and IT …
Why would you need to buy fax server software when you have a fax machine that works just fine? That 90’s relic that looks so old-fashioned and quaint. Have you ever realized that the old manual fax machine on the …
Got servers? Then you need to perform server patch management. Not annually, not once a quarter, not when you feel like getting around to it. Microsoft releases patches on a monthly basis to make it easier for IT professionals to …
Email is not only business-critical, but it is one huge repository of unstructured data that contains key knowledge, workflow information and customer contact data. All this data can offer significant value to an organization even after it is placed into …
Let’s face it; most of us in IT spend entirely too much time in firefighting mode. We talk a great game about being proactive, and keeping ahead of issues; monitoring our systems for utilization and capacity so we can schedule …
We don’t need studies and surveys to confirm what is evident in a growing number of business environments today: more and more employees are using their personal smartphones for work; the line between personal and office use is becoming ever …
In addition to the inbound communication that was covered in Part 1 of this two-part blog post, it is important to consider the need to send outbound communication through email to fax functionality. In a similar fashion to the ability …
With the New Year at the corner, it is time to start putting together our admin’s wish list for 2012. Anything goes for this list – new hardware or software for work, changes to procedures or offerings from vendors, geeky gadgets, …
Is your network sufficiently protected from web security threats? Have you been lulled into a false sense of security? Hackers are changing their habits and using new methods which are web-based, dynamic in their nature and hidden in otherwise legitimate …
No sane administrator wants to be at the receiving end of a failed Exchange Server, given the enormous pressures that the rush to restore services entails. Yet the very real possibility of data loss coupled with general inexperience with server …