Here are 20 of the best free tools that will help you conduct a digital forensic investigation. Whether it’s for an internal human resources case, an investigation into unauthorized access to a server, or if you just want to learn …
Small and medium-size businesses (SMBs) can benefit a great deal from Cloud-based services but this does not mean they have to do away with their existing infrastructure. On the contrary, careful planning, a thorough understanding of what the business and …
Recently I wrote an article about how Trust can be a security risk in one’s environment; today I will expand on that further. On the 4th of January H-Online reported a story where security firm SySS managed to get around …
In the modern age vulnerabilities are discovered in one of two ways; organizations, researcher, testers and white hats test applications for vulnerabilities due to their line of work or simply to build a reputation. Once these individuals find vulnerabilities they …
Spam has long been an affliction for everyone with an email connection, so Paul Cunningham over at ExchangeServerPro.com is holding a Spam Free 2010 contest in collaboration with GFI Software and giving away two license packs of GFI MailEssentials™. Two …
I’ve previously discussed how important it is to pay attention to the medium you’re using; transferring data via satellite for example puts you at great risk as you’re spreading your data on a wide geographical range, in most cases unencrypted. Everyone …
We are pleased to announce to all users of GFI MAX (now GFI MAX RemoteManagement) that they can now monitor Linux devices. By monitoring and managing Linux systems, MSPs, VARs and IT support organizations can extend the services they offer …
Steganography is the art of concealing messages into something innocuous in such a way that it is extremely difficult for someone to suspect, let alone find, a hidden message. The etymology of the word “steganography” comes from the Greek language …
Some time ago I was reading about the Counterfeit banknote detector pen. This pen basically writes in yellow on genuine money but in black or grey on fake money. So I thought, great but doesn’t that mean that if a …
Cloud storage solutions allow users to access their files from virtually anywhere as long as an internet connection is available. The files are stored by the solution providers. Usually the files stored in the cloud can be accessed via a …
We’re pleased to announce that all our mail server-based products, namely GFI FAXmaker, GFI MailSecurity, GFI MailEssentials and GFI MailArchiver, support Microsoft Exchange 2010. The new Exchange Server has been designed to help users achieve new levels of reliability and …