Windows PowerShell™: Essential Admin Scripts (Part 1)

In Windows PowerShell: Extracting Strings Using Regular Expressions, I introduced the Windows PowerShell and discussed the concept of regular expressions, giving an example of how to build a Windows PowerShell script to extract strings from a file using a given regular expression. In this two part series, I will discuss a number of PowerShell scripts […]

Continue reading

BYOD – The Good, the Bad and the Ugly

BYOD (Bring Your Own Device) is a term used to describe employees who take their own portable device (e.g. iPhones, iPads and laptops) to the workplace with the intention of accessing firm resources to carry out their everyday jobs. The concept also extends to users who use their own devices for work purposes while out […]

Continue reading

101 Free Admin Tools

We know administrators love tools that make life easier – especially when they’re free! So here are 101 of them! System and network analysis 1. NTFS Permissions Explorer Using this MMC snap-in you can quickly visualize the user and group permissions of a local or remote folder or drive in a hierarchical format to help […]

Continue reading

Internet Monitoring: both sides of the table (Part 2)

In the first part of this article we saw the legal parameters within which organizations implement internet monitoring. It’s easy to understand why employees feel concerned about being monitored at work. After all it’s human nature to feel uneasy knowing that someone is watching you all the time. In fact some people feel almost claustrophobic […]

Continue reading

Internet Monitoring: both sides of the table (Part 1)

The debate about internet monitoring in the workplace has been going on for years! Employees often feel their employers are yet another entity that is enforcing the big brother effect on them, yet on the flip side employers feel as if they are well within their rights to keep the company’s best interests at heart. […]

Continue reading

A Quick Look at On-Premise E-mail Archiving

In a previous post, I discussed the concept of e-mail archiving in the cloud and ran through some pros and cons of hosting your e-mail archive off-site. Today we’ll take a quick look at on-premise e-mail archiving. Having an on-premise e-mail archiving solution simply means that the e-mails that are archived remain within the organization’s […]

Continue reading

The Ins and Outs of Vulnerability Scanning

What are Vulnerability Scanners? Vulnerability scanners check your network against a database of known vulnerabilities; such a database is usually compiled from respectable resources such as CVE (http://cve.mitre.org) or OVAL (http://oval.mitre.org). They can also check for administrative oversights such as weak passwords and misconfigurations. Although most scanning applications do not fix what they have found […]

Continue reading

Have you Considered the Insider Threat of Email Security?

According to a recent report, business users send and receive an average of 110 emails per day. Such a figure indicates that email continues to play a predominant role in the day-to-day activities of an organization and that its use will continue to grow in the years to come. Being so critical gives rise to […]

Continue reading

Is email archiving in the cloud ideal for your organization?

With e-mail volumes increasing, IT budgets decreasing, legal discovery issues becoming a more common occurrence and an organization’s dependence on e-mail for business success being the norm, it’s no wonder that e-mail administrators are under increased pressure to keep on top of e-mail. There is no doubt that anyone in this position has thought about […]

Continue reading

DDOS attack on Twitter and Facebook

Two of the largest social media sites, Twitter and Facebook, fell to their knees early Thursday morning, with both being severely disrupted by a coordinated attack. Whenever any of the 45 million users belonging to the Twitter community tried to access the site yesterday they were presented with the “fail whale”, a timeout because the […]

Continue reading