Ukoback

December, 2017
Rescued from a compliance nightmare

If your business wants to accept credit cards, you must demonstrate compliance with the PCI DSS standard. It’s been said Dante reserved a special place in Hell for those who create compliance rules. Rules designed with such devious complexity they ensnare all who pass, and PCI DSS is just such a set of rules. Queue up ominous background music, mustache twisting and evil laughter. >> Read more…
 

November, 2017
Simple Hacks to Accept Credit Cards

We’re going to look at collection of simple technology hacks you can use to ensure your infrastructure is compliant. These hacks can be easily scripted to make deploying them a snap. We’ll describe each hack individually in this article, along with it’s justifications.
>> Read more…
 

October, 2017
Red Hat Bare Metal Backup with Relax and Recover (ReaR)
True bare metal backup for Red Hat that can recover a system from scratch.
 

ImageVsFile

September, 2017
Which is Best — Image Backups or File & Folder Backups?
Like the great beer commercial says Image Backups “taste great” but File & Folder Backups are “less filling.” Which to choose?
>> Read more…

 
 
secrets
August, 2017
The Tool ISP’s use to track down hackers.
If your network is under attack, how can you know who’s attacking you? Even if you know what part of the Internet the attack is coming from, what can you do about it? Who can you call to make it stop? We’re going to look at one of the most powerful tools in your arsenal for identifying where traffic is coming from and who owns the network. The tool is whois.>> Read more…

 
 

bw-devops-200x220

July, 2017
less is more, more or less
less is probably the single most commonly used tool in the SysAdmin toolbag. Its claim to fame is its ability to make it possible review large text files; files that are larger than your system’s memory. But what make less truly a power tool is it’s search ability. >> Read more…
 
 
 
 

bw-bestpractice-200x187

June, 2017
Database Backup Retention
We’ve seen much written on database backups but we see almost nothing about database backup retention. Without understanding this topic, you could find you are not able to restore what you need. Or you could be wasting time and money keeping backups for too long. >> Read more…
 
 
 

bw-coms-200x151

May, 2017
Communicating with clients during cyber attacks
On the morning of October 21st, the world awoke to a deviously clever Distributed Denial of Service attack. As an IT Provider, your job just got harder. You now need to keep your customers informed about DDoS events during a rapidly evolving attack.
>> Read more…