Here are 20 of the best free tools that will help you conduct a digital forensic investigation. Whether it’s for an internal human resources case, an investigation into unauthorized access to a server, or if you just want to learn …
One does not need a crystal ball to deduce that cloud computing will be the next big thing and because of this there needs to be some re-thinking of a company’s security strategy in order to safeguard the company data. …
In a past life, or some time ago at least… I ran a fairly successful and fast growing IT support company here in the UK. From a standing start we trampled over the local competition, doubled in size every year …
“…while mail that cannot be transmitted immediately MUST be queued and periodically retried by the sender.” (RFC5321) . This section of the SMTP RFC (Request For Comments) is the basis for Greylisting – the anti-spam technology used to detect mail …
The competition is now closed. After our successful GFI Backup 2010 – Business Edition Twitter competition last month, we’re launching another competition where you have the chance to win a fantastic NAS (Network Attached Storage) drive every day for a …
GFI MailEssentials 2010 has been released today; the latest version boosts spam detection rate using greylisting and provides users with new tools for better spam email management. With the introduction of greylisting in the latest version of GFI MailEssentials, administrators …
With the imminent announcement of GFI MAX Remote Management’s new and greatly improved remote support tool ‘Take Control’ – it’s time to take a close look at the world of Remote IT Support. If you’re a hard pressed IT Support …
Every business IT infrastructure requires tools. Obviously no one company develops every tool it needs in-house and at one time or another every company will end up buying software. Sometimes we take the software we buy for granted and this …
Technology and the IT infrastructure are constantly changing and advancing. This means that at some point a company will need to go through a change management process to keep up to date with the latest technologies.
Security has a bit of a dark side. When people are given power over other people there often seems to be the urge to abuse that power. We have previously covered the scandal in which a school used webcams on …
Scams are getting bolder and more intelligent all the time. Recent the BBC broke a story about a new scareware malware which exploits people looking for pornography. The malware which masquerades as a pornographic game once downloaded and run takes …