Communicating with clients during cyber attacks
Published on
On the morning of October 21st, the world awoke to a deviously clever Distributed Denial of Service attack. It was to date the largest ever witnessed, with the attack load exceeding 1.2 terabits per second. Distributed Denial of Service (“DDoS”) ...
Database Backup Retention
Published on
We’ve seen much written on database backups: how often, should you include transaction logs, how often to perform full backups, and what about testing. We see almost nothing about database backup retention. Without understanding this topic, you could find you ...
DevOps Companies
Published on
Less is more, more is less less is probably the single most commonly used tool in the SysAdmin toolbag. less is a pager. It’s able to display the contents of a text file and enables scrolling through the file a ...
The Secret to Tracking Down Hackers
Published on
The Tool ISP’s use to track down hackers. If your network is under attack, how can you know who’s attacking you? Even if you know what part of the Internet the attack is coming from, what can you do about ...
Image Backups vs File Backups
Published on
Which is Best — Image Backups or File & Folder Backups? A perennial quandary for System Administrators everywhere concerns doing Image Backups or File & Folder Backups and which is better. Like all quandaries, there are opinions on both sides. ...
Red Hat Linux Bare Metal Backup
Published on
Red Hat Linux Bare Metal Backup with Relax and Recover (ReaR) Bare Metal Backup on Linux has always been a challenge. Initially, an administrator may attempt some combination of dump or tar to create a reproduction of a running machine. ...
Simple Hacks to Accept Credit Cards
Published on
The rules are called the Payment Card Industry Data Security Standards or PCI-DSS and are grouped into 12 areas of how a business handles credit cards. These are further broken down into some 220 requirements a business is required to ...
PCI DSS Compensating Controls
Published on
PCI DSS Compensating Controls — Rescued from a compliance nightmare If your business wants to accept credit cards, you must demonstrate compliance with the PCI DSS standard. It’s been said Dante reserved a special place in Hell for those who ...
Network Audits
Published on
Hunting for buried treasure In 1955, Teddy Tucker was treasure hunting off the coast of Bermuda. He’d brought up some interesting artifacts, but his instincts told him there was something big hiding below. It was hurricane season, and the weather ...