Follow GFI:
Find us on Facebook Follow us on Twitter Find us on Linkedin Subscribe to our RSS Feed Find us on YouTube Find us on Google+
 

Top 20 Free Digital Forensic Investigation Tools for SysAdmins

on September 2, 2013

Here are 20 of the best free tools that will help you conduct a digital forensic investigation. Whether it’s for an internal human resources case, an investigation into unauthorized access to a server, or if you just want to learn …

0
 

What is OCR and how does it integrate with faxing?

on January 4, 2011

As an introduction to this topic, it would be best to explain what OCR stands for and what it does. When discussing technology and computers, ‘OCR’ is the common abbreviation for Optical Character Recognition and involves the electronic translation of …

1

2011: The year of living dangerously… again

on December 30, 2010

I’ll do it my way… a user’s perspective Thou shalt not… says the IT department! Another commandment, policy or order.  Really, don’t people in IT have anything better to do than impose, impose and impose? New Year resolutions… seen through …

13

Are you being watched?

on December 29, 2010

Following a comment by one of our valued readers, Patrick, I decided to write an article about Sniffing because the subject is way too broad to discuss via comments. Patrick mentioned an event which happened recently. A Chinese Telecommunications company …

7

Are Security Controversies Justified?

on December 28, 2010

Security can be very controversial at times, especially when it seems that security is throwing logic out of the window. Security is sometimes applied in a scenario when logic would dictate that it’s not really needed. Is this a good …

7

5 Benefits of switching to Virtualization Technology

on December 24, 2010

In today’s world, the main reason why IT organizations are considering virtualization of some, or all, of their computing infrastructures is that the technology helps reduce costs drastically. Consider, for example, the case of the server infrastructure where you would …

9

Are USB ports the Achilles heel of your network security?

on December 23, 2010

More and more businesses are implementing security measures to protect their networks. Antivirus software, anti-spam, email filtering and web filtering products are essential tools for every IT administrator. However, as the focus on external threats increases, very often businesses tend …

5

Review Roundup

on December 23, 2010

So the year is drawing to a close and it’s been a busy, but fun one with new software hitting the shelves as we added VIPRE to our range, MAX has developed further and new versions have been released for …

0

3 Types of Emails you wouldn’t want Archived this Festive Season

on December 22, 2010

’Tis the season to be jolly – indeed, whether you’re into the festive season or not, your friends are bound to drag you with them to celebrate the holiday spirit, and after a few doses of mulled wine you’ll probably …

2

Are you providing security for your customers?

on December 21, 2010

Security should not be considered exclusively within the context of one’s organization and environment, it is also important to consider your customers’ access to your systems. We all take things for granted and sometimes do not realise certain shortcomings until …

8

Why can’t I access the DSN I just created?

on December 20, 2010

The switch to 64 bit was an essential step for computing; however, the bliss of having the extra addressing space was not all that we got unfortunately. The mixture of 32 bit and 64 bit environments has been a source …

1