View blogs | Login
16
Dec
2015

Cloud Benefits In-House

The cloud's the hot thing and not without reason. For some it can mean cost savings and the cloud embraces several important technical advances that improve performance and security. But not everyone can trust their systems and critical customer data
By:
Mike P
Views: 0
16
Sep
2015

Be Like Hillary and Run Your Own Servers

Secretary Clinton wanted control of her information. Donít you? Do you really have it when youíre using someone elseís servers? Whatever you think of Hillary Clinton, she had reasons for running her own email server. These reasons are wo
By:
Mike P
Views: 0
18
Aug
2015

6 Tips for Safe Remote Computing

As a provider of IT services for a variety of businesses, I have witnessed a myriad of Internet vulnerability issues, especially as more and more work is performed on the road. My company, Synametrics, is a leading provider of software solutions t
By:
Mike P
Views: 0
29
Jul
2015

Good Passwords Are Key to Good Security

What are the most important measures you can take to improve your online security? New research by Google shows that security experts answer this question with a focus on password security. Passwords need to be strong and unique. The only way normal peopl
By:
Mike P
Views: 0
26
Feb
2015

MS Exchange Does a Lot, But You Can Make It Do More

Third party solutions can make Exchange Server more secure, provide failover backup and work better. Do you have Microsoft Exchange Server? You probably do, almost everyone does. Exchange does a lot for you, but it doesn't do everything. It
By:
Mike P
Views: 0
22
Feb
2015

Not Everyone Wants the Cloud

For all its benefits, cloud computing requires a leap of faith that the provider will secure your customer information. Cloud computing is the hot thing in IT and the people selling it will tell you it's inevitable. Marketers will ins
By:
Mike P
Views: 0
17
Oct
2014

POODLE Vulnerability Fixes (Disable SSLv3 and SSLv2)

Introduction POODLE allows malicious attempts on a server's SSLv3 protocol via man in the middle attack. Anything web based that uses this protocol can be compromised. POODLE Fix For Apache And Nginx For Some Linux Flavors Nginx Web ServerEx: Ubun
By:
Mike P
Views: 0
15
Oct
2014

TCP Tuning

How to tune TCP connections on your network NOTE: These methods are best kept for dedicated servers with not many other applications running. For example, a dedicated Syncrify Server. In this edition, we're exploring and optimizing some factors t
By:
Mike P
Views: 0
6
Oct
2014

SynaMan, PCI Compliance and SSL Vulnerability Scan Ratings

PCI Compliance and SynaMan Online File SharingNOTE: The latest SynaMan distribution does not have this issue because it ships with Java 1.7 and an enhanced set of key types. This article is only relevant for versions of SynaMan using Java 1.6.In the sear
By:
Mike P
Views: 0
17
Sep
2013

Linux: Starting Programs On Boot

Introduction There are many flavors of Linux today. In some scenarios it isn't possible to know all of the features of each flavor and while knowing the basis of Linux helps, it can be helpful and sometimes more convenient to know what each fl
By:
Mike P
Views: 0

About Mike P

Image for Mike P

Archives

Bloggers

Navigation

Social Media

Powered by 10MinutesWeb.com