Follow GFI:
Find us on Facebook Follow us on Twitter Find us on Linkedin Subscribe to our RSS Feed Find us on YouTube Find us on Google+
 

Top 20 Free Digital Forensic Investigation Tools for SysAdmins

on September 2, 2013

Here are 20 of the best free tools that will help you conduct a digital forensic investigation. Whether it’s for an internal human resources case, an investigation into unauthorized access to a server, or if you just want to learn …

0
 

Top 10 Malware Threats for September

on October 6, 2010

The top 10 most prevalent malware threats for the month of September were: Trojan.Win32.Generic!BT           23.54% Trojan-Spy.Win32.Zbot.gen      4.27% Trojan.Win32.Generic!SB.0       4.06% Trojan.Win32.Generic.pak!cobra 3.04% INF.Autorun (v)               …

2

Exceeding Expectations with GFI

on October 5, 2010

Check out our recent internal campaign where various GFI members shared their experiences about working at GFI as we strive to exceed expectations and aim to meet all our clients’ needs. Over the coming weeks we’ll be posting more quotes, …

0

How safe is the Internet in reality?

on October 4, 2010

In today’s day and age I would say that this question is relevant and important. When I think back to my past views about the Internet 14 years ago, topics such as “Internet and Web Security” were unknown names to …

5

DNS Blacklists: What are they, how do they work and why do we need them?

on October 1, 2010

I would like to talk to you about DNS Blacklists. Most IT Administrators that deal with mail have heard of this term but some components are still unclear. This post aims to clarify these doubts and is split into 3 …

1

How to Create a Backup – Part 1

on September 27, 2010

How to create a backup – part 1 Maybe one of the most important, and the most misunderstood, parts of working with a computer is the backup, or the process of backing up data. As most people know, a backup …

1

Green IT! Top 10 Tips for Administrators to turn Green

on September 24, 2010

Everyone can do their bit for the environment, and reduce costs, simply by being a little bit smarter about how they use information technology. Start here with these top 10 green IT tips, presented in no particular order. Setting a …

3

A Look into Insidious Threats – The Logical Bomb

on September 22, 2010

Insidious Threats – Logical Bomb (Emmanuel Carabott) When we think of security we generally get a mental picture of a war against viruses and hackers.  The reason for this is that these are by far the most common threats an …

4

August Reviews & Awards

on September 20, 2010

Throughout the month of August GFI Backup 2010 – Business Edition was reviewed by HelpNet Security in their blog post ‘Taking a Closer Look at GFI Backup Business Edition 2010’ as well as August Alvarez in his blog post and …

0

Top 5 Threats in B2B Social Media Usage: What Every Employer Should Know

on September 20, 2010

Top 5 Threats in B2B Social Media Usage: What Every Employer Should Know While social media usage has become increasingly popular, the question about whether it should make its way to the workplace or not triggers a series of debates. …

3

My emails aren’t being archived by GFI MailArchiver. What do I do?!

on September 16, 2010

GFI MailArchiver archives emails by polling them from the journal mailbox you set up in Exchange and storing them in the databases you configure. You can choose to store emails in the inbuilt GFI MailArchiver Firebird database, SQL Express or …

0