Preventing zombies from taking over your email network

While Simda being taking offline is great news it is important to keep in mind that prevention is always better than cure, even when it comes to a zombie apocalypse infecting your network.

Continue reading

How to Prevent Users from Changing GFI WebMonitor® Proxy Settings in Firefox® Using Group Policies

If you’re in an environment where users are allowed to use browsers other than the default Internet Explorer (IE), you should know that these programs will use settings outside of the Microsoft defaults. Employees using other browsers will also need to have all their traffic sent through GFI WebMonitor. In this post we’ll go through […]

Continue reading

10 Easy Steps to set up your first Virtual Machine with Hyper-V

Open up Server Manager and click on ‘Add Roles’. At the ‘Before You Begin’ page, click Next. Select ‘Hyper-V’ from the list of Roles in the ‘Select Server Roles’ page and click Next through the wizard until you get the role installation Results, confirming that Hyper-V has been installed.

Continue reading

4 Reasons why you need a Fax Server

Fax servers offer more benefits than just sending and receiving faxes. Fax servers cater for the needs of organizations of all sizes, from SMBs to Fortune 100 companies. Here are 4 main reasons why you should deploy a fax server. 1.     Save money Implementing a fax server such as GFI FAXmaker eliminates the need of […]

Continue reading

5 Benefits of switching to Virtualization Technology

In today’s world, the main reason why IT organizations are considering virtualization of some, or all, of their computing infrastructures is that the technology helps reduce costs drastically. Consider, for example, the case of the server infrastructure where you would increase the utilization of your servers from 15% to 80%, thus eliminating the need of […]

Continue reading

Patch Deployment in 3 Easy Steps

Picture a scenario of a network on 1000 hosts. On performing a network audit, it is found that 10 machines (servers and workstations) are un-patched. Although this might not seem like a large percentage (1%), one must keep in mind that it only takes one unprotected machine to infect and/or completely bring down an entire […]

Continue reading

5 tips for identifying signs of malware

We all know what a big hassle a malware infection can be. By identifying the symptoms of the malware infection and the means available to clean malware on your PC you can restore the machine to a stable state and also safe-guard it from any future malware attacks. The following 5 recommendations should go a […]

Continue reading

Top 10 Reasons to use Network Monitoring Solutions

Businesses today are faced with the tedious challenge of maintaining their network to allow for consistent availability and productivity. So here are the Top 10 reasons for using network monitoring solutions for your business. Whether you are a CEO, executive, IT manager or IT Administrator, the following information will be beneficial for you. Network monitoring […]

Continue reading

DNS Blacklists: What are they, how do they work and why do we need them?

I would like to talk to you about DNS Blacklists. Most IT Administrators that deal with mail have heard of this term but some components are still unclear. This post aims to clarify these doubts and is split into 3 sections: 1) Definition of DNS Blacklists 2) How they work 3) Use of DNSBlacklists. I […]

Continue reading

Green IT! Top 10 Tips for Administrators to turn Green

Everyone can do their bit for the environment, and reduce costs, simply by being a little bit smarter about how they use information technology. Start here with these top 10 green IT tips, presented in no particular order. Setting a Green Goal Set a green goal. Make sure everyone is aware of this goal and […]

Continue reading