Mitigating the risk of exploits

Security exploits affect all Internet-connected servers. Address discovered exploits immediately. Potential abuses include, for example: turning servers into spam factories, storage of files that are not yours, data theft, password theft, and system destruction for “fun”. There are ways to reduce your exposure to security exploits. Consider the following example. If thieves are going through…

Details

Gigabit Ethernet

Nobody likes slow networks. This claim is not very bold; it’s about as safe as claiming that everyone likes vanilla. However, unlike network equipment, vanilla does not go through technical revisions, and its suitability for use does not depend on an ever-evolving field of intricately related products (though chefs may have a differing opinion on…

Details

iBoot Web Power Switch

No one likes downtime. Downtime costs money, annoys customers, throws off accounting, and wastes productivity. The iBoot line of devices from dataprobe can help you alleviate some of the burden of downtime. These little gadgets can get your devices back up as soon as they go down, sometimes before you even know there is a problem.

Details

Speeding up the system

Sometimes it takes forever for a login to appear on your screen or for a print job to start printing. This is typically caused by how the network is setup on your UNIX server. A drop in your Internet service, slow or down DNS servers (nameservers) or a misconfigured network can all cause your system to slow down.

Details