Follow GFI:
Find us on Facebook Follow us on Twitter Find us on Linkedin Subscribe to our RSS Feed Find us on YouTube Find us on Google+
 

Top 20 Free Digital Forensic Investigation Tools for SysAdmins

on September 2, 2013

Here are 20 of the best free tools that will help you conduct a digital forensic investigation. Whether it’s for an internal human resources case, an investigation into unauthorized access to a server, or if you just want to learn …

0
 

How to stop archiving useless spam (Part 3)

on August 9, 2010

My previous post explained how an individual spam retention policy can be created with GFI MailArchiver. A spam retention policy should prevent that GFI MailArchiver archives further spam emails from the journaling mailbox into the active GFI MailArchiver Archive Store. …

0

How to stop archiving useless spam (Part 2)

on August 6, 2010

My previous post went through the steps required to avoid GFI MailArchiver archiving spam emails from the journaling mailbox into the active GFI MailArchiver Archive Store. Currently, I have temporarily disabled the current “mails servers to archive” process which is …

0

How to remove hidden network adapters from virtual machines

on August 4, 2010

When using virtualization on a Microsoft environment such as Hyper-V you can easily have network problems when restoring a Virtual hard drive or changing a network card. With some operating systems on Hyper-V you may notice that the network adapter …

2

How to stop archiving useless spam (Part 1)

on August 2, 2010

In a routine check you may have discovered that your database is growing too fast. With further investigation you may have found out that GFI MailArchiver is also archiving unwanted spam emails. In a three part tutorial I will explain: …

2

Internet Monitoring: How, what, why?

on July 29, 2010

Monitoring is a vast subject and it is often difficult to think about everything you can monitor; even worse is deciding what is worth the cost of being monitored and what can safely be ignored.  To top it all off …

6

Top 15 Most Vulnerable Applications

on July 28, 2010

Top 15 Most Vulnerable Applications Which were the most vulnerable applications in the first half of 2010? Below are the results after processing vulnerability data feeds as of July 7, 2010 from National Vulnerability Database (NVD), which is the U.S. …

11

Google Advisory: Facebook and Twitter regularly victims of malware

on July 27, 2010

Google Advisory: Facebook and Twitter regularly victims of malware – Christina Goggi Social networking sites have taken the world by storm and continue to find their way into the workplace. While these sites can work as an effective promotional tool …

6

GFI LANguard adds new applications to its patch management list

on July 26, 2010

Apple QuickTime, Adobe Air and Opera Browser among the New Applications That Can Be Patched Using GFI LANguard GFI LANguard 9.5 was launched at the end of May with a new and very important feature for people working in the …

4

Internet and email use: Know thy policies and what they mean

on July 26, 2010

An interesting legal case surfaced recently that highlighted the fact that technology alone will not help you prove your case. On the contrary, as the outcome clearly showed, technology is only a tool. How it’s used and how you interpret …

7

Unbelievable Security Stories

on July 22, 2010

I was reading a story on Reuters about a security expert who highlighted the point that ATMs (Automated Teller Machines) have certain security flaws that help hackers hit the jackpot. Certainly an intriguing story as I thought ATMs were among …

10