Here are 20 of the best free tools that will help you conduct a digital forensic investigation. Whether it’s for an internal human resources case, an investigation into unauthorized access to a server, or if you just want to learn …
The top 10 most prevalent malware threats for the month of September were: Trojan.Win32.Generic!BT 23.54% Trojan-Spy.Win32.Zbot.gen 4.27% Trojan.Win32.Generic!SB.0 4.06% Trojan.Win32.Generic.pak!cobra 3.04% INF.Autorun (v) …
Check out our recent internal campaign where various GFI members shared their experiences about working at GFI as we strive to exceed expectations and aim to meet all our clients’ needs. Over the coming weeks we’ll be posting more quotes, …
In today’s day and age I would say that this question is relevant and important. When I think back to my past views about the Internet 14 years ago, topics such as “Internet and Web Security” were unknown names to …
I would like to talk to you about DNS Blacklists. Most IT Administrators that deal with mail have heard of this term but some components are still unclear. This post aims to clarify these doubts and is split into 3 …
How to create a backup – part 1 Maybe one of the most important, and the most misunderstood, parts of working with a computer is the backup, or the process of backing up data. As most people know, a backup …
Everyone can do their bit for the environment, and reduce costs, simply by being a little bit smarter about how they use information technology. Start here with these top 10 green IT tips, presented in no particular order. Setting a …
Insidious Threats – Logical Bomb (Emmanuel Carabott) When we think of security we generally get a mental picture of a war against viruses and hackers. The reason for this is that these are by far the most common threats an …
Throughout the month of August GFI Backup 2010 – Business Edition was reviewed by HelpNet Security in their blog post ‘Taking a Closer Look at GFI Backup Business Edition 2010’ as well as August Alvarez in his blog post and …
Top 5 Threats in B2B Social Media Usage: What Every Employer Should Know While social media usage has become increasingly popular, the question about whether it should make its way to the workplace or not triggers a series of debates. …
GFI MailArchiver archives emails by polling them from the journal mailbox you set up in Exchange and storing them in the databases you configure. You can choose to store emails in the inbuilt GFI MailArchiver Firebird database, SQL Express or …