Here are 20 of the best free tools that will help you conduct a digital forensic investigation. Whether it’s for an internal human resources case, an investigation into unauthorized access to a server, or if you just want to learn …
My previous post explained how an individual spam retention policy can be created with GFI MailArchiver. A spam retention policy should prevent that GFI MailArchiver archives further spam emails from the journaling mailbox into the active GFI MailArchiver Archive Store. …
My previous post went through the steps required to avoid GFI MailArchiver archiving spam emails from the journaling mailbox into the active GFI MailArchiver Archive Store. Currently, I have temporarily disabled the current “mails servers to archive” process which is …
When using virtualization on a Microsoft environment such as Hyper-V you can easily have network problems when restoring a Virtual hard drive or changing a network card. With some operating systems on Hyper-V you may notice that the network adapter …
In a routine check you may have discovered that your database is growing too fast. With further investigation you may have found out that GFI MailArchiver is also archiving unwanted spam emails. In a three part tutorial I will explain: …
Monitoring is a vast subject and it is often difficult to think about everything you can monitor; even worse is deciding what is worth the cost of being monitored and what can safely be ignored. To top it all off …
Top 15 Most Vulnerable Applications Which were the most vulnerable applications in the first half of 2010? Below are the results after processing vulnerability data feeds as of July 7, 2010 from National Vulnerability Database (NVD), which is the U.S. …
Google Advisory: Facebook and Twitter regularly victims of malware – Christina Goggi Social networking sites have taken the world by storm and continue to find their way into the workplace. While these sites can work as an effective promotional tool …
Apple QuickTime, Adobe Air and Opera Browser among the New Applications That Can Be Patched Using GFI LANguard GFI LANguard 9.5 was launched at the end of May with a new and very important feature for people working in the …
An interesting legal case surfaced recently that highlighted the fact that technology alone will not help you prove your case. On the contrary, as the outcome clearly showed, technology is only a tool. How it’s used and how you interpret …
I was reading a story on Reuters about a security expert who highlighted the point that ATMs (Automated Teller Machines) have certain security flaws that help hackers hit the jackpot. Certainly an intriguing story as I thought ATMs were among …