Latest posts

Installing Exchange 2016 on Windows Server 2016? Not so fast!

If you are considering deploying the latest Exchange on the latest version of Windows Server, be aware there’s a major and yet unfixed bug.

Continue reading

GFI OneGuard (Beta) introduces a new view on system administration

Today we are launching a beta version of our newest product, a platform that will provide a complete and centralized protection of your IT infrastructure from viruses, malware, vulnerabilities and other cyber threats.

Continue reading

“A small investment in cyber security can save your business” – interview with Dejan Kosutic

The International Computer Security Day is a great reminder for IT pros to review company security levels. We’ve asked information security expert Dejan Kosutic to which ‘bumps on the road’ you need to pay attention to.

Continue reading

Third Party Patch Roundup – November 2016

Google published several Chrome updates in November, addressing several security and stability issues, while other vendors had a more or less calm month.

Continue reading

11 most useful PowerShell commands for remote management

Using PowerShell for managing remote computers quickly and efficiently has been one of its main advantages. If you’re not familiar with it, these commands will get you up to speed.

Continue reading

10 reasons to upgrade your enterprise to Windows 10

Sticking to Windows 7 may seem logical for you and your company, but are you aware of all the features you’re missing out, which can make daily system administration much easier.

Continue reading

GFI OneConnect Beta brings advanced protection and email continuity

Ensuring safe and continuous delivery of business emails is one of IT department’s top priorities. Today we’re presenting GFI OneConnect Beta, a solution delivering a more secure and reliable email service for businesses of all sizes.

Continue reading

How to avoid becoming a part of a DDoS attack?

Considering the magnitude of the recent DDoS attack on Dyn, that almost brought down the internet, all sysadmins must take action to prevent their devices from taking part in future attacks.

Continue reading