Follow GFI:
Find us on Facebook Follow us on Twitter Find us on Linkedin Subscribe to our RSS Feed Find us on YouTube Find us on Google+
 

Top 20 Free Digital Forensic Investigation Tools for SysAdmins

on September 2, 2013

Here are 20 of the best free tools that will help you conduct a digital forensic investigation. Whether it’s for an internal human resources case, an investigation into unauthorized access to a server, or if you just want to learn …

0
 

Oops! We’ve lost your data!

on October 21, 2009

Over 100,000 former adult students in Virginia are being contacted by the education authorities after a USB stick with information including their names, social security numbers and employment and demographic details, was misplaced. The data was not encrypted, the Washington …

1

Into uncharted territory

on October 20, 2009

I decided to go a bit further than usual, and push the limits of the unknown. I decided to install Funtoo, a Gentoo based distro or rather fork, by the Gentoo fouder Daniel Robbins. Daniel is no longer active in …

0

GFI MAX visits SMB Nation 2009 in Riviera, Las Vegas

on October 19, 2009

It was a warm, arid evening when MAX stepped off the plane in McClaren Airport in fabulous Las Vegas, Nevada.  MAX brought his favorite crew – Kevin Hodak, Sales Engineer, Anne Murphy, Channel Marketing Manager and Kelly O’Bray, Post Sales …

0

Mind that password… again

on October 16, 2009

Last week I commented on the phishing attack that resulted in more than 10,000 passwords being leaked online. An analysis of the passwords showed that many computer users are more concerned with choosing a password that they can remember rather …

2

GFI Malta hosts EMEA Conference

on October 16, 2009

The GFI EMEA Distributor Conference 2009 was held on Friday, October 9 at The Palace Hotel in Sliema. There were 38 EMEA Distributors present plus executive management, the EMEA sales team, members from Product Management and members from the Marketing department. …

2

Vulnerability Related Standards

on October 13, 2009

Security vulnerabilities in software applications are the most important factor that helps malware to spread. The number of known vulnerabilities is increasing every day. Vulnerability databases like National Vulnerability Database, SecurityFocus or Secunia publish thousands of new vulnerabilities each year. …

2

Could Cross Platform be used as a means of redundancy?

on October 12, 2009

I came across a story by Nick Farrell of the Inquirer about a case that happened to an Australian Power company. The crux of the story is that a virus infected the company’s infrastructure and was spreading inside the network. …

2

The SVN recovery story

on October 9, 2009

So it happened that the disk hosting our code repository developed some bad blocks. Must be contagious or something, this is already the third system within a month… I noticed this, when I received some strange messages from cron. Basically …

0

Facebook, Facebookhealth and the rogue AntiVirus application

on October 8, 2009

A mass operation is underway to infect several thousands of computers worldwide. The attack from the malware writers is taking place from various sources using an array of different techniques. Information regarding this attack until now is very limited however …

7

Mind that password

on October 8, 2009

The phishing attack that led to more than 10,000 Hotmail, MSN and Live.com passwords being exposed online earlier this week has provided an interesting glimpse into the mindset of email users when setting up their accounts. A researcher who managed …

4