Follow GFI:
Find us on Facebook Follow us on Twitter Find us on Linkedin Subscribe to our RSS Feed Find us on YouTube Find us on Google+
 

Top 20 Free Digital Forensic Investigation Tools for SysAdmins

on September 2, 2013

Here are 20 of the best free tools that will help you conduct a digital forensic investigation. Whether it’s for an internal human resources case, an investigation into unauthorized access to a server, or if you just want to learn …

0
 

The Hybrid Approach – giving SMBs the ‘best of both worlds’

on January 22, 2010

Small and medium-size businesses (SMBs) can benefit a great deal from Cloud-based services but this does not mean they have to do away with their existing infrastructure. On the contrary, careful planning, a thorough understanding of what the business and …

0

Trust – Certifications

on January 19, 2010

Recently I wrote an article about how Trust can be a security risk in one’s environment; today I will expand on that further. On the 4th of January H-Online  reported a story where security firm SySS managed to get around …

5

Internet Explorer 0Day Vulnerability: The Aurora Exploit

on January 18, 2010

In the modern age vulnerabilities are discovered in one of two ways; organizations, researcher, testers and white hats test applications for vulnerabilities due to their line of work or simply to build a reputation. Once these individuals find vulnerabilities they …

1

Win a copy of GFI MailEssentials with ExchangeServerPro.com

on January 18, 2010

Spam has long been an affliction for everyone with an email connection, so Paul Cunningham over at ExchangeServerPro.com is holding a Spam Free 2010 contest in collaboration with GFI Software and giving away two license packs of GFI MailEssentials™. Two …

0

How to handle security

on January 14, 2010

I’ve previously discussed how important it is to pay attention to the medium you’re using; transferring data via satellite for example puts you at great risk as you’re spreading your data on a wide geographical range, in most cases unencrypted. Everyone …

0

Monitor Linux devices using GFI MAX

on January 12, 2010

We are pleased to announce to all users of GFI MAX (now GFI MAX RemoteManagement) that they can now monitor Linux devices. By monitoring and managing Linux systems, MSPs, VARs and IT support organizations can extend the services they offer …

0

The Threats of Steganography

on January 11, 2010

Steganography is the art of concealing messages into something innocuous in such a way that it is extremely difficult for someone to suspect, let alone find, a hidden message. The etymology of the word “steganography” comes from the Greek language …

1

Trust – The Enemy of Security?

on January 6, 2010

Some time ago I was reading about the Counterfeit banknote detector pen.  This pen basically writes in yellow on genuine money but in black or grey on fake money. So I thought, great but doesn’t that mean that if a …

2

Undetected Threats: Cloud Storage

on December 28, 2009

Cloud storage solutions allow users to access their files from virtually anywhere as long as an internet connection is available. The files are stored by the solution providers.  Usually the files stored in the cloud can be accessed via a …

0

All GFI mail server-based products support Microsoft Exchange 2010.

on December 23, 2009

We’re pleased to announce that all our mail server-based products, namely GFI FAXmaker, GFI MailSecurity, GFI MailEssentials and GFI MailArchiver, support Microsoft Exchange 2010. The new Exchange Server has been designed to help users achieve new levels of reliability and …

1