Businesses of all sizes are being faced with many options when it comes to hosting their website, application, and mail servers. Shared hosting is by far the most common, where a single server’s resources are shared by a number of different users. However, if you are a company looking for more control and stability, it […]
If you do some research online for figures regarding OS usage, you will see that the stats differ and estimates vary. However, one thing that most surveys and studies agree on is that Linux has an overwhelming share of the OS market, especially when compared to Windows, which is widely viewed as the main competitor. […]
Our team has been laser-focused on security-related topics for National Cyber Security Awareness Month this October. If there is any big takeaway from this exercise, it’s seeing how pervasive cyber security is. Cyber security permeates every layer of technology, every node touched, every person involved — from client, to administrator, to developer, and beyond. […]
Until recently, Linux authentication through a centralized identity service such as IPA, Samba Active Directory, or Microsoft Active Directory was overly complicated. It generally required you to manually join a server or workstation to a company’s domain through a mixture of Samba windbind tools, and kerbose krb5 utilities. These tools are not known for their […]
At the speed that information travels, it’s easy to forget that the Internet is relatively young. With the potential for exponential growth, above all the negative foresight, we can start to see the benefits of the Internet when data is used to progress technology; and humanity as a whole. Cybersecurity projects dedicated to analysis, development, […]
Security experts can only do so much. Imagine the sophisticated systems at global banks, research facilities, and Las Vegas casinos (“Ocean’s Eleven,” anyone?) — an excess of cameras, guards, motion detectors, weight sensors, lasers, and failsafes. But what happens if someone leaves the vault door open? Similarly, server and network security measures can only go […]
While working as a sysadmin over the years, you truly start to understand the importance of security patches. On a semi-daily basis I see compromised servers that have landed in an unfortunate situation due to lack of security patching or insecure program execution (e.g. running a program as root unnecessarily). In this blog post I’ll […]
SSH is a common system administration utility for Linux servers. Whether you’re running CentOS, Debian, Ubuntu, or anything in between; if you’ve logged into a Linux server before, you likely have at least heard of it. The acronym SSH stands for “Secure Socket Shell”, and as the name implies, the protocol is built with security […]
Don’t be afraid to use IPv6, It’s not a whole lot different from IPv4. IPv6 Basics Taking a first look at IPv6 can be overwhelming, but in reality, the addressing scheme is exactly the same as IPv4. For example, it would be possible to write an IPv4 address as FFFF:FFFF, which would equate to 255.255.255.255. […]
Many of us work with spreadsheets every day. It’s what allows us to deal with multiple projects at once, each with reams of data. A spreadsheet helps us tame this data — and the better the spreadsheet is laid out and designed, the more it can help us be efficient when processing this data. Since […]