Browsed by
Author: mmessier

Phishing gets more dangerous for 2016

Phishing gets more dangerous for 2016

In January, Wombat Security Technologies released its 2016 State of the Phish report, detailing the current phishing landscape. The research report found that, while these phishing attacks are growing in sheer number, they are also growing in their complexity based on the practices used to implement them. To most enterprise professionals, especially those working in IT, it’s understood that phishing is still a common threat. However, 85% of those surveyed for this report said that they had been the victim…

Read More Read More

Running legacy web apps on Windows 10

Running legacy web apps on Windows 10

Microsoft Edge, Windows 10’s new default web browser, doesn’t support ActiveX, DirectX filters, VML vector graphics, or VBScript. But upgrading to Windows 10 doesn’t mean your organization’s legacy web apps won’t work. To ensure that Windows 10 was compatible with older applications (such as those that require an ActiveX control), Microsoft included Internet Explorer 11 with the new operating system. However, before you can run ActiveX controls safely, you’ll need to tweak IE 11’s settings. Tweaking the settings To get…

Read More Read More

Free tools for managing partitions

Free tools for managing partitions

Most modern operating systems contain built-in tools for creating, deleting, or resizing partitions. But many users find that third-party tools make these types of tasks easier, since such tools might not have the same limitations as a native partition management utility. Here are several good partition managers, which won’t cost you a dime. 1: MiniTool Partition Wizard Free Edition As its name suggests, MiniTool Partition Wizard Free Edition (Figure A) is a free tool for creating and managing partitions. It…

Read More Read More

How to block Windows 10 upgrade

How to block Windows 10 upgrade

Microsoft has published detailed instructions on how to stop your computer from trying to upgrade itself to Windows 10. The walkthrough will allow IT admins both to opt out of the automatic upgrade to Windows 10 and disable the Get Windows 10 icon from showing on the taskbar. The guide, published here, details how to install and configure a Group Policy Object to block the upgrade options. The policy settings can be enabled by users running Windows 7, Windows 7…

Read More Read More

Monitors that go beyond Task Manager

Monitors that go beyond Task Manager

Sometimes when a Windows system becomes unresponsive, the Task Manager is often the go-to tool for figuring out the problem. But as helpful as the Task Manager can be for tracking down the offending process, a number of other tools are available that can provide even more insight into what’s going on. Here are 5 tools that will assist. 1: Microsoft Process Monitor Microsoft Process Monitor (Figure A) is part of the Windows Sysinternals collection, which encompasses numerous tools for…

Read More Read More

Underground Hacker Economy is Booming

Underground Hacker Economy is Booming

Dell SecureWorks published in November 2013 the results of a remarkable project taken on by its Counter Threat Unit (CTU) Director of Malware Research Joe Stewart and independent Network Security Analyst David Shear: The Underground Hacking Economy is Alive and Well. Their research uncovered an extensive and virile underground market for hackers and digital ne’er-do-wells. The duo listed available bad-guy tools, hacker services, and their associated costs. For example, the ever-popular US Fullz sold for $25 US. That may seem…

Read More Read More

Data recovery tools that could save the day

Data recovery tools that could save the day

There are a lot of ways to lose critical data — like hardware failure, an OS crash, a user error, or a malicious attack. If it happens to you, one of these tools may help you get that data back. 1: R-Studio Data Recovery Software R-Studio Data Recovery Software (Figure A) is a data recovery application for PCs. This application is different from many others in that it doesn’t just scan hard disks — it can also open disk images…

Read More Read More

Expect massive spikes in global security threats for 2015

Expect massive spikes in global security threats for 2015

Increases of global information security threats remain as much a certainty as death and taxes, at least according to the latest Information Security Survey from PWC. That report, which was published in October, highlights several troublesome trends and provides valuable information for those concerned with enterprise IT security. Nonetheless, interpreting the information delivered into applicable best practices remains a challenge for many IT security professionals. Especially those who will be assigned the task of keep their organizations from becoming one…

Read More Read More

Five apps for House Cleaning your systems

Five apps for House Cleaning your systems

All systems, be they desktops, laptops, smartphones, or tablets need a little cleaning now and then. Sometimes the cleaning is just a simple riding various caches or deleting unwanted files. Other times, the cleaning is deeper and more involved. No matter what the situation, you need the tools to be able to rid that system of what ails it. 1: CCleaner CCleaner has been my go-to tool for cleaning up various temporary files on Windows machines for a long time….

Read More Read More

Five Free web-based apps for Real-time graphs

Five Free web-based apps for Real-time graphs

Creating graphs is easy — grab your favorite spreadsheet program, enter some data, and use the chart wizard. What’s more difficult is creating those graphs to be published on the web based on dynamic data. Plenty of options are available to graph hard-entered data, but few are capable of dynamic generation. Take a look at five free web-based tools for creating different types of graphs from dynamic data. Each of these apps offers a vast number of options and lots…

Read More Read More