Cyber Security: WiFi Security

Nowadays, many organisations want their employees to be mobile and be able to connect from everywhere. It is an excellent approach, however…. most of the network intrusions and phishing occur through mobile and wi-fi devices. Credentials can easily be phished by cyber-criminals and used to access your confidential data. Here…

Continue Reading

How Do I – Citrix NetScaler CLI

“How Do I” Series With this blog post, we are opening a series of “How Do I” posts about all sorts of technical tips and tricks that will help you co configure, support, troubleshoot and monitor various systems. The idea behind the “How Do I” series is to give you…

Continue Reading

Stale Citrix XenApp/XenDesktop Sessions

Very often in our own and our clients’ XenApp and XenDesktop environments we face an issue where some sessions mysteriously stay connected with no owner when users disconnect. These phantom or ghost sessions cause lots of headache to IT support teams. To briefly describe the issue: (more…)

Continue Reading

Cloud Zootopia – Sloth and the Hare

  More and more organisations are moving to Cloud. Some companies decide to go to Amazon AWS, some to Google cloud and others to Microsoft Azure & Office 365. During many cloud projects, we were involved with, we’ve seen a very common pattern – businesses have hard time realizing that…

Continue Reading

New Citrix Handbook and Best Practices

Some of our clients ask how iRangers architects approach the solution design initiatives and what our design recommendations are based on. Of course, most of our design recommendations come from experience and all of them are based on industry leading practices. Most of the time, to structure the approach and…

Continue Reading

Critical Vulnerability in Adobe Flash

A critical vulnerability has recently been identified by Adobe in their Flash Player version 23.0.0.185 or earlier. The CVE-2016-7855 vulnerability allows hackers to run malicious code on the affected computer using a Flash file. The existing exploit can potentially grant the hacker the full control over the affected system. Flash…

Continue Reading