Phishing is today’s most popular Internet scam. Phishing attacks are so successful as they are usually based on human emotions. Nowadays everyone has an email and fishing emails are sent in a bulk to thousands of targets. So how does it work? (more…)

Citrix NetScaler – GeoIP, Geo Fencing, GSLB Locations Stopped Working After an Upgrade
One of the reasons we love Citrix so much is that they would never let us be bored 🙂 If you upgraded to the latest build of Citrix NetScaler (such as 11.1 build 53.13), you may be wondering why some of your services stopped working 🙂 It took us some…
In the “Ransomware” News Today…
“WannaCry, Wcry, and WannaCrypt enter the bank… Hands up! It’s a robbery – shouts one of them! Give us all your money (or just $300 bucks) for a password and no file will be hurt.” (more…)
Cyber Security: WiFi Security
Nowadays, many organisations want their employees to be mobile and be able to connect from everywhere. It is an excellent approach, however…. most of the network intrusions and phishing occur through mobile and wi-fi devices. Credentials can easily be phished by cyber-criminals and used to access your confidential data. Here…
One Of The Most Important Cyber Security Facts: Staff Security Awareness
One Of The Most Important Cyber Security Facts: Staff Security Awareness Information is the most valuable asset that organisations own. Information leakage caused by accident or due to a lack of awareness occur all the time and can cause huge damage to an organisation and even people lives! Although there…

WOW… We Didn’t Know That This Level of Expertise Exists in Our Back Yard!
“WOW… We Didn’t Know That This Level of Expertise Exists in Our Back Yard!” this is what we hear over and over for last several years when we meet with businesses. I can understand where this excitement is coming from. For many years enterprises here in prairies who needed high-end…

How Do I – Citrix NetScaler CLI
Grab a handy cheat sheet to help you with configurations NetScaler CLI Troubleshooting “How Do I” Series With this blog post, we are opening a series of “How Do I” posts about all sorts of technical tips and tricks that will help you co configure, support, troubleshoot and monitor various…

Stale Citrix XenApp/XenDesktop Sessions
Very often in our own and our clients’ XenApp and XenDesktop environments we face an issue where some sessions mysteriously stay connected with no owner when users disconnect. These phantom or ghost sessions cause lots of headache to IT support teams. To briefly describe the issue: (more…)
Cloud Zootopia – Sloth and the Hare
More and more organisations are moving to Cloud. Some companies decide to go to Amazon AWS, some to Google cloud and others to Microsoft Azure & Office 365. During many cloud projects, we were involved with, we’ve seen a very common pattern – businesses have hard time realizing that…

New Citrix Handbook and Best Practices
Some of our clients ask how iRangers architects approach the solution design initiatives and what our design recommendations are based on. Of course, most of our design recommendations come from experience and all of them are based on industry leading practices. Most of the time, to structure the approach and…