After installing a linux server and playing with the basic command lines, the first thing we should be able to do is configure our network, without which of course there is no Internet. Most of the latest linux distributions ship…
After installing a linux server and playing with the basic command lines, the first thing we should be able to do is configure our network, without which of course there is no Internet. Most of the latest linux distributions ship…
Everyone knows what is FTP. But there’re few things that even confuses smartest geeks. Steven Frank has written an excellent article; FTP Demystified, which explains the most confused stuffs in FTP Like: 1. What is the difference between FTP, FTPS,…
After being Spammed and Attacked, Blue Security has shut down its anit-spam service. According to the Netcraft’s Performance Chart Blue Security’s web site was unavailable for an extended period on Sunday and Monday, and again this morning. The founder of…
Today I attended a seminar called Workplace IT Security & Communications Solutions for Today’s Business organized by one of our technology partner. It was an interesting event where several networking vendors presented about the IT Security Technology and the latest…
It’s very difficult to stay safe online today without understanding the security jargons. Phishing is one of the most popular techniques used by criminals to fool the users (even quite experienced ones) in giving in their personal information. Phishing –…
Recently a new type of DNS attack have been discovered. Attackers are exploiting the recursive name servers to amplify the DDoS attacks by utilizing IP spoofing. If you want to know the very details of how this attack works then…
I was awestruck by the increase of traffic in my blog after posting WinXP and OSX dual boot in MacBook Pro. I did expect some extra traffic, but didn’t have a clue that it would be this huge. It’s great…
One of our customer was interested in a security solution that was tightly integrated, easy to manage and cost effective. After researching for a while I found that Astaro Security Gateway software (formerly Astaro Security Linux) was one of the…
Just finished reading Time Management for System Administrators by Thomas A. Limoncelli. I highly recommend this book to every System and Network Administrator. The book is packed with really useful tips for geeks who need to address the time management…
We are currently evaluating the Request Tracker (RT) in our office. Request Tracker is a ticketing system which enables to efficiently manage problems, tasks, issues, and requests submitted by users. RT is an online ticketing system tightly integrated with email.…
Recent Comments