Home Download | Exchange Server | Feedback | Index | ISA-Server | Jokes | Terms of Service/Usage Policy | Windows Security | What's New | White Papers
 Networking Topics
Windows XP Prof
Windows XP Home
Windows 2000 Server
Windows 2000 Prof
Windows NT4 Server
Windows NT4 Work.
Windows ME
Windows 98
Windows 95
Windows 3.x

Network Basics
Trouble Shooting

Exchange Server
e-Mail Security
e-Mail Spam
Server Software
Windows Security
 Featured Product
 Network Addons
Direct Cable
Serial / Parallel
High Speed Cables
WLAN - Wireless
Jokes ( computer )
Download Site

Security White Papers

Do you manage your own Mail-Server ?
Is your Mail-Server protected against virus-attacks ?

Try the new Freeware version of
GFI MailSecurity :

The freeware version basically allows administrators to scan all their mail for viruses at no cost!
If they want other security features and multiple virus engines, then that would require purchasing a license.
Even if they already have antivirus installed, another anti virus engine on their email server will just double up
their security at no cost.
The full release about the freeware version is available at : http://www.gfi.com/news/en/msec8freeware.htm.

White Paper
Some White papers written by GFI on Network and E-Mail Security

Email Security White Papers:

One Virus Engine Is Not Enough: The Case for Maximizing Network Protection with Multiple Anti-Virus Scanners
This paper studies a number of anti-virus engine tests which reveal that each virus scanner presents its own strengths
and weaknesses. As no single anti-virus engine can fully protect against all possible threats, this paper examines how
simultaneous use of more than one virus engine can achieve greater security than is technically possible when relying
on one anti-virus engine alone.

Why You Need an Email Exploit Detection Engine: Networks Must Supplement Anti-Virus Protection for Maximum Security
Virus-writers are using increasingly complex and sophisticated techniques in their bid to circumvent anti-virus software
and disseminate their viruses. Email security tools must evolve in the same way if such threats are to be blocked before
they can cause harm. This paper examines how anti-virus software, though essential, cannot combat such threats and
shows why an email exploit detection tool is also necessary.

Protecting your network against email threats: How to block email viruses and attacks
This white paper describes various methods used by email viruses and worms to penetrate a protected network.
Such methods include attachment files containing harmful code, social engineering attacks, crafted MIME headers,
malicious use of HTML Script and similar technologies. A URL is provided where you can test whether your email
system is vulnerable to threats like these. This document also examines the ways through which email can be sanitized
and filtered of malicious code using GFI's email content/exploit checking and anti-virus solution based on Microsoft's
virus scanning API (VS API), GFI MailSecurity for Exchange/SMTP.

Why anti-virus software is not enough: The urgent need for server-based email content checking
This white paper explains why anti-virus software alone is not enough to protect your organization against the current
and future onslaught of computer viruses. Examining the different kinds of email attacks that threaten today's organizations,
this paper describes the need for a solid server-based content-checking solution to safeguard your business against
email viruses and attacks.

Email security
This white paper provides useful background information on email security issues. It will help you examine the security
threats facing your corporate email system and determine what kind of email security solution your company needs.

Test your e-mail Security !

Commercial Message:

Some Network Security White Papers:

Log-based intrusion-detection and -analysis in Windows 2000/NT
This white paper demonstrates that the audit and reporting facilities in Microsoft Windows NT and Microsoft
Windows 2000, although a good foundation, fall far short of fulfilling real-life business needs. Therefore, the
need exists for a log-based intrusion-detection and -analysis tools.

Immediate intrusion detection: Catching hackers red-handed on your web server!
This white paper focuses on how administrators can set up their web servers successfully and safely.
Describing the tools used by hackers to gain backdoor access to your IIS web servers, this paper details
the necessary steps to detect successful intrusions on your network, as well as explaining how to prevent
such attacks to your web server.

Summary Link page

WindowsNetworking.com is in no way affiliated with Microsoft Corp.
Copyright © 2014, TechGenix Ltd. All rights reserved. Please read our Privacy Policy and Terms & Conditions.