Articles

Danger Ahead  

Simple backup strategies cannot protect files encrypted by ransomware, because they can be affected as well. A PowerShell script can ensure that your files are okay before sending them to backup.

Against the Wall  

Automatically create restrictive rules in Linux iptables packet filters.

Kicking the Tires  

Service Pack 1 for Exchange 2013 introduced a new protocol, which has become the default in Exchange 2016: MAPI over HTTP.

Herding Containers  

Security, deployment, and updates for thousands of nodes prove challenging in practice, but with CoreOS and Kubernetes, you can orchestrate container-based web applications in large landscapes.

Auntie Amanda  

The free Amanda backup utility dates back to the days of tape drives, but it is still a powerful tool for centralized backup across the network.

Double Protection  

If your database is so important that the content must not be lost between periodic data backups, replication is a possible solution. We describe how to set up replication for MariaDB with the aid of XtraBackup.

Ransomware Storm  

In the tsunami of ransomware infections this year, the Locky encryption trojan is a high-water mark. With a constant stream of novel attack patterns, this continually evolving pest makes life difficult for IT managers, users, and security vendors. Here's how to protect yourself.

Don't Hack Me Bro  

The Bro security framework takes a new approach to security monitoring, with the emphasis on trends and long-term analysis.

Son of SPDY  

HTTP/2 offers reduced website load times and other performance benefits, along with the promise of server push.

The Return of the Macro Virus  

With the resurgence of sophisticated macro virus attacks, new countermeasures are in order. We offer a few recommendations.
Powered by eZ Publish™ CMS Open Source Web Content Management. Copyright © 1999-2014 eZ Systems AS (except where otherwise noted). All rights reserved.