Five reasons engineers use the cloud for simulations.
Dynamic Routing with Red Hat
Traffic Shaping with Red Hat
Hunting for Buried Treasure
Rescued from a compliance nightmare
Simple Hacks to Accept Credit Cards
Red Hat Bare Metal Backup with Relax and Recover (ReaR)
Which is Best — Image Backups or File & Folder Backups?
Like the great beer commercial says Image Backups “taste great” but File & Folder Backups are “less filling.” Which to choose?
>> Read more…
The Tool ISP’s use to track down hackers.
If your network is under attack, how can you know who’s attacking you? Even if you know what part of the Internet the attack is coming from, what can you do about it? Who can you call to make it stop? We’re going to look at one of the most powerful tools in your arsenal for identifying where traffic is coming from and who owns the network. The tool is whois.>> Read more…
less is more, more or less
less is probably the single most commonly used tool in the SysAdmin toolbag. Its claim to fame is its ability to make it possible review large text files; files that are larger than your system’s memory. But what make less truly a power tool is it’s search ability. >> Read more…
Database Backup Retention
We’ve seen much written on database backups but we see almost nothing about database backup retention. Without understanding this topic, you could find you are not able to restore what you need. Or you could be wasting time and money keeping backups for too long. >> Read more…
Communicating with clients during cyber attacks
On the morning of October 21st, the world awoke to a deviously clever Distributed Denial of Service attack. As an IT Provider, your job just got harder. You now need to keep your customers informed about DDoS events during a rapidly evolving attack.
>> Read more…