Follow GFI:
Find us on Facebook Follow us on Twitter Find us on Linkedin Subscribe to our RSS Feed Find us on YouTube Find us on Google+
 

The 31 Worst Face-Palm Moments in IT

on August 2, 2013

You’ve probably heard the phrase “The Good, the Bad, and the Ugly”. I want to introduce another in the same vein as that – “The Dumb, the Stupid, and the Unbelievable”. I’ve been an IT consultant for many years, and …

0
 

Green IT! Top 10 Tips for Administrators to turn Green

on September 24, 2010

Everyone can do their bit for the environment, and reduce costs, simply by being a little bit smarter about how they use information technology. Start here with these top 10 green IT tips, presented in no particular order. Setting a …

3

A Look into Insidious Threats – The Logical Bomb

on September 22, 2010

Insidious Threats – Logical Bomb (Emmanuel Carabott) When we think of security we generally get a mental picture of a war against viruses and hackers.  The reason for this is that these are by far the most common threats an …

4

August Reviews & Awards

on September 20, 2010

Throughout the month of August GFI Backup 2010 – Business Edition was reviewed by HelpNet Security in their blog post ‘Taking a Closer Look at GFI Backup Business Edition 2010’ as well as August Alvarez in his blog post and …

0

Top 5 Threats in B2B Social Media Usage: What Every Employer Should Know

on September 20, 2010

Top 5 Threats in B2B Social Media Usage: What Every Employer Should Know While social media usage has become increasingly popular, the question about whether it should make its way to the workplace or not triggers a series of debates. …

3

My emails aren’t being archived by GFI MailArchiver. What do I do?!

on September 16, 2010

GFI MailArchiver archives emails by polling them from the journal mailbox you set up in Exchange and storing them in the databases you configure. You can choose to store emails in the inbuilt GFI MailArchiver Firebird database, SQL Express or …

0

How to create a very strong password

on September 15, 2010

Researchers call for stronger passwords An article on the BBC recently called for people to use stronger passwords in the wake of more computational power available to hackers. We know that security needs to scale as computers become more powerful …

15

How to identify vulnerabilities in common software products

on September 14, 2010

Vulnerabilities in common software products Mohammed S. Ali 25th August 2010 Large numbers of binary planting vulnerabilities (also known as “dll spoofing” or “dll preloading attacks”) have been discovered in third party applications running on Microsoft Windows platforms. Software companies …

3

Win an iPod nano 8GB (6th gen)

on September 13, 2010

Because you’re our fans, you’re great people And great people deserve a reward, so we’re giving you the chance to win the brand new just released iPod nano 8GB (6th Generation)!! What do you have to do to win it? …

2

Our 27 Favorite IT Admin Blogs

on September 13, 2010

The various authors who write on Talk Tech To Me are avid readers themselves and have their own shortlist of favorite IT blogs, which we figured would be a great resource to share with our readers. Discussing current tech issues …

11

We Want Your Vote! So if you like it, ‘Like’ it please!

on September 9, 2010

We Want Your Vote! So if you like it, ‘Like’ it please! The Bob Around the World competition was held internally for all GFI Software staff and as you can see from the numerous photos that have been uploaded, it’s …

0