Start up in Windows

Today it is difficult to find an organization that has not been subjected to virus attacks. And although almost everywhere already have antivirus software installed, it is sometimes necessary to manually see where in the registry run programs, and not even necessarily harmful. When searching for the resident malware we are interested in the following […]

Read More

Munin. Replacement of MRTG.

Rummaging in the wilds of the Internet has dug up an interesting tool Munin. Its main purpose is rendering many indicators of the operating system on which it is installed and not just on it. The tool is very convenient and easy to install. CentOS for just a couple of commands: yum install munin yum […]

Read More

Web Database

Sometimes, the databases can grow so huge that they need to be hosted separately to maintain data security and also to isolate the precious data from the buggy applications hosted on a common web server. Depending upon your requirements, you can pick the kind of database hosting service you’re interested in. A web database is […]

Read More

What does Mod_security refer to ?

ModSecurity is an open source, free web application firewall (WAF) Apache module. With over 70% of all attacks now carried out over the web application level, organizations need all the help they can get in making their systems secure. WAFs are deployed to establish an external security layer that increases security, detects and prevents attacks […]

Read More

How To Secure My Domain Name ?

Brief Description Domain names are a hot commodity these days. For some, selecting a domain name is a thorough process that takes a bit of research and time to complete. While it’s extremely important to select one that fits your business best, you can take things a step further by securing variations of your primary […]

Read More