Follow GFI:
Find us on Facebook Follow us on Twitter Find us on Linkedin Subscribe to our RSS Feed Find us on YouTube Find us on Google+
 

Top 20 Free Digital Forensic Investigation Tools for SysAdmins

on September 2, 2013

Here are 20 of the best free tools that will help you conduct a digital forensic investigation. Whether it’s for an internal human resources case, an investigation into unauthorized access to a server, or if you just want to learn …

0
 

How to create a very strong password

on September 15, 2010

Researchers call for stronger passwords An article on the BBC recently called for people to use stronger passwords in the wake of more computational power available to hackers. We know that security needs to scale as computers become more powerful …

15

How to identify vulnerabilities in common software products

on September 14, 2010

Vulnerabilities in common software products Mohammed S. Ali 25th August 2010 Large numbers of binary planting vulnerabilities (also known as “dll spoofing” or “dll preloading attacks”) have been discovered in third party applications running on Microsoft Windows platforms. Software companies …

3

Win an iPod nano 8GB (6th gen)

on September 13, 2010

Because you’re our fans, you’re great people And great people deserve a reward, so we’re giving you the chance to win the brand new just released iPod nano 8GB (6th Generation)!! What do you have to do to win it? …

2

Our 27 Favorite IT Admin Blogs

on September 13, 2010

The various authors who write on Talk Tech To Me are avid readers themselves and have their own shortlist of favorite IT blogs, which we figured would be a great resource to share with our readers. Discussing current tech issues …

11

We Want Your Vote! So if you like it, ‘Like’ it please!

on September 9, 2010

We Want Your Vote! So if you like it, ‘Like’ it please! The Bob Around the World competition was held internally for all GFI Software staff and as you can see from the numerous photos that have been uploaded, it’s …

0

Common reasons why content updates fail in GFI MailEssentials (Part 3 of 3)

on September 9, 2010

In my last post I did some further pre-checks to identify the main reason for the update failure. I found out that the build version of GFI MailEssentials is up-to-date, my license key is entitled to download update files for …

1

3 Very Good Reasons to Monitor Internet Usage in the Workplace

on September 6, 2010

3 Very Good Reasons to Monitor Internet Usage in the Workplace Social media platforms are becoming increasingly popular even within the workplace and although such sites may turn out to be great promotional tools, and therefore blocking them completely would …

2

Don’t be fooled by Labor Day phishing scams

on September 3, 2010

If you see an increase in phishing attacks it’s to be expected due to the upcoming Labor Day holiday. GFI Labs, our dedicated malware research center, warns that consumers are traditionally at high risk for targeted phishing attacks due to …

0

GFI Software Announces Top 10 Malware Threats for August

on September 3, 2010

GFI Software Announces Top 10 Malware Threats for August The top 10 most prevalent malware threats for the month of August are: 1. Trojan.Win32.Generic!BT 25.11% 2. Trojan-Spy.Win32.Zbot.gen 4.23% 3. Trojan.Win32.Generic.pak!cobra 3.61% 4. INF.Autorun (v) 3.27% 5. Trojan.Win32.Generic!SB.0 2.01% 6. BehavesLike.Win32.Malware …

1

Common reasons why content updates fail in GFI MailEssentials (Part 2 of 3)

on September 2, 2010

In my last post I performed some pre-checks to identify the reason for the update failure. I found out that the update fails permanently, the license key is however valid and the licensed users have not been exceeded. In the …

0