Network

Page 3

Ensure your insurance business has the right IT software

Insurance is meant to mitigate a loss. Whether if it is a home, person, car, or health, very personal data is transferred between the agent, agency, and the insured.  The insurance industry is often used as an example for tight regulations at both the state and federal level. With all of the data leaks, ransomware, […]

Continue reading

JIGSAW changes its game to cryptojacking

An old friend has veered its ugly head. First mentioned on TechTalk in 2016, JIGSAW has made a reappearance with a few updated tweaks. This old form of ransomware has been altered to steal Bitcoin by changing the addresses of wallets and sending the payments to the hacker’s account. JIGSAW was infamous for appearing on computer […]

Continue reading

The top 20 free Network Monitoring and Analysis Tools for sysadmins

We know how administrators love free tools that make their life easier so here are 20 of the best free tools for monitoring devices, services, ports or protocols and analysing traffic on your network.

Continue reading

Keeping the healthcare industry safe with the right IT software

The hospital and healthcare industry met quite a few challenges involving ransomware in the last year. Learn how you can protect your business with different solutions at one low price per user with GFI Unlimited.

Continue reading

Windows PowerShell: Automating common admin tasks

Back in 2012, I wrote a number of blog posts that highlighted the efficacy of PowerShell and how it could be used to make your life as a sysadmin easier. This article builds on Windows PowerShell: Extracting Strings Using Regular Expressions, Windows PowerShell: Essential Admin Scripts (Part 1), and Windows PowerShell: Essential Admin Scripts (Part […]

Continue reading

Top 10 Free System Troubleshooting Tools for SysAdmins

Here are 10 of the best free tools / packages for troubleshooting system issues. These tools should help you as an admin to fix the problem or identify the root cause more quickly.

Continue reading

Last month’s top cybersecurity stories – June 2018

What stories hit the news in the month of June. Ticketmaster customers hacked pretty badly. What will GDPR do about it? Cryptocrash at South Korea’s Coinrail to the tune of $40 Billion. Apple to close iPhone privacy hole used by FBI.

Continue reading

Windows PowerShell: Extracting Strings Using Regular Expressions

This post has been reviewed in 2018 and its information is still relevant. We also recently published another post with information about how to automate common admin tasks with PowerShell.  Windows PowerShell is a powerful (no pun intended!) command line scripting language built on top of the .NET framework. Version 2.0 of Windows PowerShell comes […]

Continue reading

Email data leaks just got riskier

The GDPR brings some big changes to the way companies must handle data, and that includes data in email messages. Email may be the weak spot in your data security strategy, but it doesn’t have to be.

Continue reading

Scanning Open Ports in Windows: A Quick Guide (Part 2)

This post has been reviewed and the information is still relevant as of June 2018. In early 2012, I wrote an article called Scanning Open Ports in Windows: A Quick Guide that covered how to use NetStat.exe, Tasklist.exe, TCPView.exe and PortQry.exe and Scanning Open Ports in Windows: Part 3 that covered how to use NMAP to […]

Continue reading

Find us on Facebook

Follow us on Twitter