View blogs | Login
16
Dec
2015

Cloud Benefits In-House

The cloud has been one of the hottest sectors in the technology industry, without reason. The cloud embraces several important technical advances that improve performance and security. And for some it can mean cost savings. But not everyone can trust the
By:
Mike P
Views: 0
16
Sep
2015

Be Like Hillary and Run Your Own Servers

Secretary Clinton wanted control of her information. Don?t you? Do you really have it when you?re using someone else?s servers? Whatever you think of Hillary Clinton, she had reasons for running her own email server. These reasons are worth
By:
Mike P
Views: 0
18
Aug
2015

6 Tips for Safe Remote Computing

We put the best security capabilities we can into our products, but we can't do it all. You should be aware of other products and - more importantly - safe practices that thwart the common cyber attacks that victimize innocent users. In a previou
By:
Mike P
Views: 0
29
Jul
2015

Good Passwords Are Key to Good Security

What are the most important measures you can take to improve your online security? Research done by Google shows that security experts answer this question with a focus on password security. Passwords should be strong and unique and should not include per
By:
Mike P
Views: 0
26
Feb
2015

MS Exchange Does a Lot, But You Can Make It Do More

Do you have Microsoft Exchange Server? You probably do, almost everyone does. Exchange does a lot for you, but it doesn't do everything. Third party solutions can make a Microsoft Exchange Server more secure, provide failover backup, and enable it to
By:
Mike P
Views: 0
22
Feb
2015

Not Everyone Wants the Cloud

For all its benefits, cloud computing requires customers to take a leap of faith that their provider will secure their information. Cloud computing is the hot thing in IT and the companies will tell you moving to the cloud is inevitable
By:
Mike P
Views: 0
17
Oct
2014

POODLE Vulnerability Fixes (Disable SSLv3 and SSLv2)

Introduction POODLE allows malicious attempts on a server's SSLv3 protocol via man in the middle attack. Anything web based that uses this protocol can be compromised. POODLE Fix For Apache And Nginx For Some Linux Flavors Nginx Web ServerEx: Ubun
By:
Mike P
Views: 0
15
Oct
2014

TCP Tuning

How to tune TCP connections on your network NOTE: These methods are best kept for dedicated servers with not many other applications running. For example, a dedicated Syncrify Server. In this blog, we're going to explore and optimize some factors t
By:
Mike P
Views: 0
6
Oct
2014

SynaMan, PCI Compliance and SSL Vulnerability Scan Ratings

PCI Compliance and SynaMan Online File SharingNOTE: The latest SynaMan distribution does not have this issue because it ships with Java 1.7 and an enhanced set of key types. This article is only relevant for versions of SynaMan using Java 1.6.In the sear
By:
Mike P
Views: 0
17
Sep
2013

Linux: Starting Programs On Boot

Introduction There are many flavors of Linux today. In some scenarios it isn't possible to know all of the features of each flavor and while knowing the basis of Linux helps, it can be helpful and sometimes more convenient to know what each fl
By:
Mike P
Views: 0

About Mike P

Image for Mike P

Archives

Bloggers

Navigation

Social Media

Powered by 10MinutesWeb.com