Follow GFI:
Find us on Facebook Follow us on Twitter Find us on Linkedin Subscribe to our RSS Feed Find us on YouTube Find us on Google+
 

Top 20 Free Digital Forensic Investigation Tools for SysAdmins

on September 2, 2013

Here are 20 of the best free tools that will help you conduct a digital forensic investigation. Whether it’s for an internal human resources case, an investigation into unauthorized access to a server, or if you just want to learn …

0
 

5 Popular Hacking Techniques – Do you know your enemies? (Part 2)

on November 30, 2010

Welcome back. In part one, we explained the importance of understanding the threats against your network and looked at three common hacking techniques that the bad guys might use against you. They included Attacking Defaults, SQL Injection, and Exploiting Unpatched …

5

Cyber Monday Competition

on November 29, 2010

Competition is now closed We’re jumping on the Cyber Monday bandwagon by having a mini competition which is just fun! There are 100 GFI WebMonitor inflatable truncheons to be won and out of the 100 winners, one of you will …

3

5 Popular Hacking Techniques – Do you know your enemies?

on November 29, 2010

“Know your enemy and know yourself and you can fight a hundred battles without disaster.” – Sun Tzu While the famous Chinese general may not have had hacking techniques in mind when he penned The Art of War some 2500 …

7

5 Benefits of Automating Patch Management

on November 25, 2010

In a previous article I wrote about software patches and why relying on auto updating systems of individual applications is not a practical solution for corporate networks. You need a patch management solution for proper patch management. But what are …

5

Three Ways in which Email Archiving Software can make an Administrator’s Life Easier

on November 24, 2010

Email has become a key form of communication for businesses worldwide. Every day, billions of emails are sent and received and the ever-increasing volume of email is becoming a concern for systems administrators in every type of enterprise. Storage issues, …

1

8 Steps to Securing a Public Machine

on November 23, 2010

Mohammed S Ali, wrote an interesting article about the dangers of using public PCs, so to continue with the topic I’ll be explaining what you need to do to secure a machine for public use. 1. Physical Security The first …

5

GFI wins Software Vendor of the Year award from CRN!

on November 19, 2010

Great news for GFI! GFI has won the Software Vendor of the Year award from the UK channel publication CRN. Despite some tough competition from vendors such as Microsoft, Orcale, IBM UK, Citrix and Avaya, GFI’s submission was considered by …

2

Patch Deployment in 3 Easy Steps

on November 19, 2010

Picture a scenario of a network on 1000 hosts. On performing a network audit, it is found that 10 machines (servers and workstations) are un-patched. Although this might not seem like a large percentage (1%), one must keep in mind …

4

Why Security Policies Cannot Stand Alone

on November 18, 2010

One important tool in security is without a doubt an effective security policy. A security policy helps to ensure that common procedures across the organization are followed thus facilitating the identification of risks and mitigation of said risks as well …

4

New Version of GFI LANguard™ Released

on November 17, 2010

New version is the first solution to automate patching for all major Web browsers running on Windows systems We’re pleased to announce the release of GFI LANguard™ version 9.6, the first network security solution to automate missing patch detection and …

1