Here are 20 of the best free tools that will help you conduct a digital forensic investigation. Whether it’s for an internal human resources case, an investigation into unauthorized access to a server, or if you just want to learn …
As an introduction to this topic, it would be best to explain what OCR stands for and what it does. When discussing technology and computers, ‘OCR’ is the common abbreviation for Optical Character Recognition and involves the electronic translation of …
I’ll do it my way… a user’s perspective Thou shalt not… says the IT department! Another commandment, policy or order. Really, don’t people in IT have anything better to do than impose, impose and impose? New Year resolutions… seen through …
Following a comment by one of our valued readers, Patrick, I decided to write an article about Sniffing because the subject is way too broad to discuss via comments. Patrick mentioned an event which happened recently. A Chinese Telecommunications company …
Security can be very controversial at times, especially when it seems that security is throwing logic out of the window. Security is sometimes applied in a scenario when logic would dictate that it’s not really needed. Is this a good …
In today’s world, the main reason why IT organizations are considering virtualization of some, or all, of their computing infrastructures is that the technology helps reduce costs drastically. Consider, for example, the case of the server infrastructure where you would …
More and more businesses are implementing security measures to protect their networks. Antivirus software, anti-spam, email filtering and web filtering products are essential tools for every IT administrator. However, as the focus on external threats increases, very often businesses tend …
So the year is drawing to a close and it’s been a busy, but fun one with new software hitting the shelves as we added VIPRE to our range, MAX has developed further and new versions have been released for …
’Tis the season to be jolly – indeed, whether you’re into the festive season or not, your friends are bound to drag you with them to celebrate the holiday spirit, and after a few doses of mulled wine you’ll probably …
Security should not be considered exclusively within the context of one’s organization and environment, it is also important to consider your customers’ access to your systems. We all take things for granted and sometimes do not realise certain shortcomings until …
The switch to 64 bit was an essential step for computing; however, the bliss of having the extra addressing space was not all that we got unfortunately. The mixture of 32 bit and 64 bit environments has been a source …