Follow GFI:
Find us on Facebook Follow us on Twitter Find us on Linkedin Subscribe to our RSS Feed Find us on YouTube Find us on Google+
 

Top 20 Free Digital Forensic Investigation Tools for SysAdmins

on September 2, 2013

Here are 20 of the best free tools that will help you conduct a digital forensic investigation. Whether it’s for an internal human resources case, an investigation into unauthorized access to a server, or if you just want to learn …

0
 

How to create a complex and secure backup strategy

on July 1, 2010

Nobody likes to backup, but the reality is that hard drive failure or other types of disaster (natural or not) is something that we need to be prepared for at any time. What better way of being prepared for disaster …

3

Is Privacy Dead?

on June 28, 2010

With the advent of the internet many people seem to forget about privacy and its importance.  Some people claim that privacy is actually dead and has been for a while and we have plenty of examples of people who knowingly …

12

Who Will Win the World Cup 2010?

on June 25, 2010

As the first round of the FIFA World Cup 2010 comes to an end so does our fantastic GFI World Cup Competition. If you still haven’t submitted your vote you’ve got until the end of today (June 25) to do …

3

Do you know the dangers of wireless networks?

on June 24, 2010

I came across a story about an old case from 2007 where hackers infiltrated T.J. Maxx’s wireless network at one of the outlets and stole over 45 million credit card numbers. Those involved got caught and convicted. While it’s true …

7

Top 10 Security Precautions when using Social Networking Sites

on June 23, 2010

It is impossible and illegal to stop employees from using social networking sites 24/7 and even if it were legal it wouldn’t be a good idea as it could easily alienate your employees. The best course of action is to …

13

How to secure your network the old fashioned way

on June 18, 2010

Many times we think of security as policies, software, hardware and other such things; however, there is a lot more to it. When securing your network (especially in a large company with multiple locations) it’s imperative to perform log monitoring …

5

Create your own coverpage for GFI FAXmaker™ (Part 2 of 2)

on June 17, 2010

In my previous post explained how you may create a custom coverpage for GFI FAXmaker based on your own company policies. In this post I will show you how you can add the customized coverpage to GFI FAXmaker and then …

0

GFI Software and Sunbelt Announce Strategic Partnership

on June 17, 2010

We would like to announce that we have entered into a strategic partnership with Sunbelt Software, a leading provider of Windows security software and the creators of the successful VIPRE® line of security solutions. Over the coming months, the companies …

0

Create your own coverpage for GFI FAXmaker™ (Part 1 of 2)

on June 16, 2010

In this step by step blog article I will show you how you can easily create and customize your own corporate coverpage for GFI FAXmaker based on your own policies. For this I’ll be using the following Microsoft Windows tools: …

0

Top 5 Risks caused by employees’ actions

on June 15, 2010

Employees generally do not mean to harm the organization for which they work; however, sometimes due to a lack of due diligence or even lack of education on security employees might pose a grave security risk to an organization. Below …

4