Communicating with clients during cyber attacks
Published on
On the morning of October 21st, the world awoke to a deviously clever Distributed Denial of Service attack. It was to date the largest ever witnessed, with the attack load exceeding 1.2 terabits per second. Distributed Denial of Service (“DDoS”) ...
Database Backup Retention
Published on
We’ve seen much written on database backups: how often, should you include transaction logs, how often to perform full backups, and what about testing. We see almost nothing about database backup retention. Without understanding this topic, you could find you ...
DevOps Companies
Published on
Less is more, more is less less is probably the single most commonly used tool in the SysAdmin toolbag. less is a pager. It’s able to display the contents of a text file and enables scrolling through the file a ...
The Secret to Tracking Down Hackers
Published on
The Tool ISP’s use to track down hackers. If your network is under attack, how can you know who’s attacking you? Even if you know what part of the Internet the attack is coming from, what can you do about ...