You’ve probably heard the phrase “The Good, the Bad, and the Ugly”. I want to introduce another in the same vein as that – “The Dumb, the Stupid, and the Unbelievable”. I’ve been an IT consultant for many years, and …
Every organization is aware of the importance of security – security of the building, security for employees and financial security are all a priority; however, an organization comprises many other assets that require security, most notably its IT infrastructure. An …
During the recent months, spam originating from China has been hitting the mailboxes of users from all over the world. One interesting fact is that this latest wave of spam is constructed differently from its predecessors. What makes this spam …
@GFISoftware has hit another milestone on Twitter with over 5,000 followers keeping themselves up-to-date on all the latest news in web security, email management, network security and managed services and all other GFI Software-related events. Our Twitter account is kept active …
For those who need to explore the intricacies of authentication mechanisms that are available on Windows operating systems, I would like to make a stop at Windows Digest authentication and make a few comments about how it works (or doesn’t). …
July 22nd 2009 - Steve Ballmer signed off the RTM builds for both Windows 7 and Windows Server 2008 R2 at the annual sales kick-off event in Atlanta. This is big news for us all at GFI. Video of signing: Windows …
GFI Software is giving ONE lucky person the chance to win an amazing PlayStation 3! The rules are simple and winning is just a tweet away. All you need to do is: follow @GFISoftware on Twitter express your desire to …
The Volume Shadow Copy Service (VSS), part of Microsoft Windows, provides a mechanism to create consistent point-in-time copies of hard-drives and is used by backup applications such as GFI Backup. Further information on how VSS works can be found at …
Have you ever wondered as to how processor affinity influences a single threaded process on a multiprocessor machine? Well, I have. Today nearly all new machines come with 2 or 4 cores. If you’re lucky, you have an 8 core …
Data has nowadays become our most valuable asset which needs to be protected at any cost. Data can be protected in many ways; however, the most common technique to protect information is with the use of passwords. A password consists …
In the first of this two part article, the discussion centered around the creation of IT security policies and why there often is strong resistance to their existence and implementation. Successfully implementing IT security polices goes beyond the technology and …