Articles

Double Protection  

If your database is so important that the content must not be lost between periodic data backups, replication is a possible solution. We describe how to set up replication for MariaDB with the aid of XtraBackup.

Ransomware Storm  

In the tsunami of ransomware infections this year, the Locky encryption trojan is a high-water mark. With a constant stream of novel attack patterns, this continually evolving pest makes life difficult for IT managers, users, and security vendors. Here's how to protect yourself.

Don't Hack Me Bro  

The Bro security framework takes a new approach to security monitoring, with the emphasis on trends and long-term analysis.

Son of SPDY  

HTTP/2 offers reduced website load times and other performance benefits, along with the promise of server push.

The Return of the Macro Virus  

With the resurgence of sophisticated macro virus attacks, new countermeasures are in order. We offer a few recommendations.

III  

The functions and objects of the jQuery JavaScript library make the work of web developers much easier. Although jQuery 3 remains largely compatible with version 2, some changes might prevent its use.

Unreadable  

A rarely used feature for improving security in Windows environments relies on certificates issued for various applications, services, and procedures that is based on a public key infrastructure.

Cloud Service  

DBaaS moves the database service to the cloud, promising a new database instance at the click of a mouse.

Menu of the Day  

Chef administrators unafraid of a learning curve can employ a powerful tool for Windows client management. Teamed with PowerShell, it offers more than some system management suites.

Easy Maintenance  

Armed with the right tools, you can manage your network infrastructure both automatically and effectively in a DevOps environment.
Powered by eZ Publish™ CMS Open Source Web Content Management. Copyright © 1999-2014 eZ Systems AS (except where otherwise noted). All rights reserved.