Follow GFI:
Find us on Facebook Follow us on Twitter Find us on Linkedin Subscribe to our RSS Feed Find us on YouTube Find us on Google+
 

Top 20 Free Digital Forensic Investigation Tools for SysAdmins

on September 2, 2013

Here are 20 of the best free tools that will help you conduct a digital forensic investigation. Whether it’s for an internal human resources case, an investigation into unauthorized access to a server, or if you just want to learn …

0
 

Network Internet Control – Managing Risk the Right Way

on October 4, 2011

The first thing that comes to mind when discussing network Internet control is usually how the administrator can make sure that users are visiting legitimate websites. Secondly, most administrators would be running regular virus scans of any file(s) downloaded from …

6

Microsoft Action Ends the Kelihos Botnet

on September 28, 2011

In another victory against spammers, Microsoft’s Digital Crimes Unit (DCU) has taken down the Kelihos botnet, which at the time the command and control servers were knocked offline, controlled some 41,000 infected hosts and was able to send 3.8 billion …

3

Taking the Right Measures to Improve Exchange Performance

on September 23, 2011

With most small and medium-sized businesses (SMBs) depending on Microsoft Exchange as the core of their messaging infrastructure, Exchange performance is critical to the Exchange admin. Whether the email is down, or merely slow, admins will need to take care …

2

The 43 Things Administrators Should Never Do

on September 22, 2011

Administrators have a tough job on their hands to manage, maintain and protect the network they are responsible for. Armed with the latest tools, they do an excellent job; however, at times, often due to pressure, they make mistakes – …

8

Defending Against Zero-Day Threats

on September 20, 2011

Zero-day threats are attacks that use an unknown exploit/attack for which no patch or antivirus definition file exists as yet, and they are a major concern for administrators.  So what can an administrator do to prevent zero-day attacks from affecting …

5

The Art of Social Engineering

on September 19, 2011

Years ago, at a company I used to work for, a large group of employees, myself included, were the target of a spam email that had been deliberately sent through the corporate network and encouraged us to click on a …

4

Implementing a Fax Server in a VoIP Environment

on September 15, 2011

Voice over IP (VoIP) is becoming an increasingly popular means to deploy the phone infrastructure within the SMB space.  However, the move to VoIP presents the challenge of interfacing the new VoIP system with the ability to send and receive …

7

Understanding Website Categorization in GFI WebMonitor

on September 5, 2011

GFI WebMonitor is robust web filtering, web monitoring and web security solution, that provides administrators with more than 70 categories of websites from which to choose and provide granular flexibility when applying policies. However, how many of us really understand …

5

What You Should Know About Exchange Email Backup

on September 1, 2011

Backing up email is a crucial task, and is necessary to safeguard the valuable information stored in email. Yet how many organisations take a critical look at how and why they backup email? For organisations that want to run an …

4

57 Tips Every Admin Should Know

on August 24, 2011

The longer a person serves as a network admin, the more tips and tricks they are likely to pick up along the way. Some could be shortcuts, others might seem like magic, but all are intended to save you time …

9