Sophos UTM vs Untangle
UTM or Unified Threat Management devices are becoming more and more popular as businesses and corporations have realized in the past couple of years that a simple tradition firewall of…
Virtualization, Cloud, DevOps, Reviews
UTM or Unified Threat Management devices are becoming more and more popular as businesses and corporations have realized in the past couple of years that a simple tradition firewall of…
Two step verification is quickly becoming the preferred means of authentication especially for the security minded out there who want that extra layer of security protecting their personal accounts or…
Nginx is rapidly gaining popularity in the WebHosting world, especially since performance, speed, and scaling are becoming ever more important. Â Nginx is capable of handling a large amount of concurrent…
The story broke before the weekend as reported among others by the Hacker News about Windows 10 Preview having a keylogger to spy on your activities.  It seems that Microsoft may…
In this day and age of high profile exploits in the news involving businesses that we all know and use, digital security is more on the minds of everyone now…
How many times have all of us walked away from our workstations thinking that the CTRL+ALT+DELETE and then ENTER keystrokes we entered successfully locked our workstations only to come back…
Recently, in working on updating an Ubuntu server for a client that was running a customized version of Nginx compiled with Google Pagespeed and other mods, we wanted to install…
I ran across a pesky issue with my Samsung Galaxy S4 the other day where I wanted to copy a few pictures and a video from my phone’s internal memory…
I was asked the question just the other day about cloud computing and what my thoughts were on the whole concept. Â It made me realize the questions revolving around cloud…
If you have a website running on nginx and you want to make sure the content is not viewable by anyone that isn’t authenticated, the easiest way to set this…