Free Pluralsight.com Subscription – Free Access to over 4500 Video Courses on...
Pluralsight is a site that offers computer-based training covering hundreds of professions from IT (programming, networking, computers, operatingsystems, Microsoft Office, web design etc) to business...
View ArticleFirewall.cx: 15 Years’ Success – New Logo – New Identity – Same Mission
This December (2015) is a very special one. It signals 15 years of passion, education, learning, success and non-stop ‘routing’ of knowledge and technical expertise to the global IT community.What...
View ArticleHow to Manually Deploy – Install GFI LanGuard Agent When Access is Denied By...
When IT Administrators and Managers are faced with the continuous failure of GFI LanGuard Agent deployment e.g (Access is denied), it is best to switch to manual installation in order to savevaluable...
View ArticleFour Security Principles That Help Secure Web Applications & Restrict Access...
We read about successful website hack attacks almost on a daily basis. Security companies claim that not enough is being done and more awareness is needed. Our article covering major security breaches...
View ArticleInstall & Fix Cisco VPN Client on Windows 10 (32 & 64 Bit). Fix Reason 442:...
This article shows to how correctly install Cisco VPN Client (32& 64 bit) on Windows 10 (32& 64 bit) using simple steps, overcome the ‘This app can’t run on this PC’ installation error, plus...
View ArticleAutomate Software Deployment with the Help of GFI LanGuard. Quick & Easy...
Deploying a single application to hundreds of workstations or servers can become a very difficult and time-consuming task. Thankfully, remote deployment of software and applications is a feature...
View ArticleOSPF Adjacency & Neighbor Forming Process. OSPF Hello Messages, OSPF Database...
This is the second article of our OSPF series which describes how OSPF routers perform neighbor relationship and adjacency. We’ll examine how OSPF discovers neighbors by sending Hello packets through...
View ArticleAutomate Web Application Security - Why, How & The Necessary Tools
In this article, we’re going to talk about automating your web security in the safest and most effective way. We’ll also touch on a few Web Application Security automation tools worth considering...
View ArticleHow to Easily Change Network Profile / Network Location (Private or Public)...
Network Location Awareness (NLA) is a feature offered on Windows Server 2012 R2 and all Windows workstation editions from Windows 8.1 and above, including Windows 10. When connecting to a network (LAN...
View ArticleDealing with User Copyright Infringement (Torrents), Data Loss Prevention...
One of the largest problems faced by organizations of any size is effectively controlling user internet access (from laptops, mobile devices, workstations etc), minimizing the security threats for the...
View ArticleIntroducing Colasoft Unified Performance Management
Colasoft Unified Performance Management (UPM) is a business-oriented network performance management system, which analyzes network performance, quality, fault, and security issues based on business. By...
View ArticleGFI WebMonitor: Monitor & Secure User Internet Activity, Stop Illegal File...
In our previous article we analysed the risks and implications involved for businesses when there are no security or restriction policies and systems in place to stop usersdistributing illegal content...
View ArticleFirewall.cx: 15 Years’ Success – New Logo – New Identity – Same Mission
This December (2015) is a very special one. It signals 15 years of passion, education, learning, success and non-stop ‘routing’ of knowledge and technical expertise to the global IT community.What...
View ArticleGFI WebMonitor: Monitor & Secure User Internet Activity, Stop Illegal File...
In our previous article we analysed the risks and implications involved for businesses when there are no security or restriction policies and systems in place to stop usersdistributing illegal content...
View ArticleFree Webinar: Troubleshooting & Fixing Microsoft Hyper-V Hosts & Clusters
Users working with Hyper-V Virtualization would be interested to know that Altaro is hosting a free webinar on the 25th of February 2016 at 4pm CET / 10am EST. Microsoft Cloud and Datacenter Management...
View ArticleColasoft Announces Release of Capsa Network Analyzer v8.2
February 23, 2016 – Colasoft LLC, a leading provider of innovative and affordable network analysis solutions, today announced the availability of Colasoft Capsa Network Analyzer v8.2, a real-time...
View ArticleTop 3 Most Popular Web Application Vulnerabilities - Security Scans of 396...
Since 2011 Netsparker scanned 396 open source web applications. The scanners identified 269 vulnerabilities and Netsparker published 114 advisories about the 0-day ones. 32 of the advisories include...
View ArticleDetect Brute-Force Attacks with nChronos Network Security Forensic Analysis Tool
Brute-force attacks are commonly known attack methods by which hackers try to get access to restricted accounts and data using an exhaustive list/database of usernames and passwords. Brute-force...
View ArticleUpgrading - Uploading AnyConnect Secure Mobility Client v4.x SSL VPN on Cisco...
This article will show how to download and upload the newer AnyConnect 4.x VPN clients to your CiscoASA Firewall appliance (5500 & 5500-X Series) and configure WebVPN so that the newer AnyConnect...
View ArticleGFI WebMonitor Installation: Gateway / Proxy Mode, Upgrades, Supported O/S &...
GFI WebMonitor is an awarded gateway monitoring and internet access control solution designed to help organizations deal with user internet traffic, monitor and control bandwidth consumption, protect...
View Article