Follow GFI:
Find us on Facebook Follow us on Twitter Find us on Linkedin Subscribe to our RSS Feed Find us on YouTube Find us on Google+
 

How to confirm your systems aren’t suffering a major Heartbleed

on April 15, 2014

The Internet was rocked last week when a two-year-old bug in OpenSSL was revealed. Heartbleed, as the vulnerability is known, can result in massive information disclosure through simple requests that require no privileges, and leave no logs. Anything from command …

0
 

How to stop archiving useless spam (Part 4)

on August 18, 2010

In my previous post I prepared the first steps required to move all emails except spam emails into the new GFI MailArchiver Archive Store. For this I have created a new Archive Store in GFI MailArchiver. Now I will configure …

0

Software Reviewers Wanted

on August 16, 2010

If you have a tech blog then this is for you! We’re giving all tech bloggers the opportunity to write some great content for their blog by reviewing GFI WebMonitor™ – our internet monitoring and anti-virus software. If this sounds …

11

Bob All Over the World

on August 13, 2010

We love holding competitions and giving our followers the opportunity to win some great prizes, so we thought ‘why not hold an in-house competition for all GFI Software employees and enable them to win something too?’ So we did. Their …

0

How to stop archiving useless spam (Part 3)

on August 9, 2010

My previous post explained how an individual spam retention policy can be created with GFI MailArchiver. A spam retention policy should prevent that GFI MailArchiver archives further spam emails from the journaling mailbox into the active GFI MailArchiver Archive Store. …

0

How to stop archiving useless spam (Part 2)

on August 6, 2010

My previous post went through the steps required to avoid GFI MailArchiver archiving spam emails from the journaling mailbox into the active GFI MailArchiver Archive Store. Currently, I have temporarily disabled the current “mails servers to archive” process which is …

0

How to remove hidden network adapters from virtual machines

on August 4, 2010

When using virtualization on a Microsoft environment such as Hyper-V you can easily have network problems when restoring a Virtual hard drive or changing a network card. With some operating systems on Hyper-V you may notice that the network adapter …

2

How to stop archiving useless spam (Part 1)

on August 2, 2010

In a routine check you may have discovered that your database is growing too fast. With further investigation you may have found out that GFI MailArchiver is also archiving unwanted spam emails. In a three part tutorial I will explain: …

2

Internet Monitoring: How, what, why?

on July 29, 2010

Monitoring is a vast subject and it is often difficult to think about everything you can monitor; even worse is deciding what is worth the cost of being monitored and what can safely be ignored.  To top it all off …

6

Top 15 Most Vulnerable Applications

on July 28, 2010

Top 15 Most Vulnerable Applications Which were the most vulnerable applications in the first half of 2010? Below are the results after processing vulnerability data feeds as of July 7, 2010 from National Vulnerability Database (NVD), which is the U.S. …

11

Google Advisory: Facebook and Twitter regularly victims of malware

on July 27, 2010

Google Advisory: Facebook and Twitter regularly victims of malware – Christina Goggi Social networking sites have taken the world by storm and continue to find their way into the workplace. While these sites can work as an effective promotional tool …

6