Tag: security

Which vSphere CPU Scheduler to Choose

The release of vSphere 6.7 Update 2 brought with it a new vSphere CPU scheduler option, the Side-Channel Aware Scheduler version 2 (SCAv2) or “Sibling Scheduler.” This new scheduler can help restore some performance lost to CPU vulnerability mitigations, but...

/ May 15, 2019

What you missed in cybersecurity this week

It’s been a busy week — it’s tough to keep up with all the cybersecurity news. We’ve collected some of the biggest cybersecurity stories from the week — from TechCrunch and afar — to keep you up to date with...

/ April 22, 2019

Building a Secure Data Center that You Can Carry in a Backpack with vSphere 6.7

Mobile data centers in the field help modern military forces stay connected and execute their missions. Cubic Mission Solutions works with VMware to deliver lightweight systems for the U.S. military and its allies that are truly portable, easy to use,...

/ April 17, 2019

Updates to VM Compatibility and VMware Tools with vSphere 6.7 Update 2

Note: vSphere 6.7 Update 2 was recently announced and will soon be generally available as an update and download. With VMware Tools version 10.0 VMware took the decision to separate it’s release cycle from that of vSphere. On that note...

/ April 9, 2019

vSphere Platinum 6.7 Update 2 Brings New Visualizations, Capabilities, and Security Features

The release of vSphere 6.7 Update 2 was announced (and will soon be generally available as an update and download), bringing improvements and fixes to all editions of vSphere. This includes vSphere Platinum 6.7 Update 2, the premier edition of...

/ April 3, 2019

Announcing vSphere 6.7 Update 2, vSphere Platinum updates, and vSphere ROBO Enterprise

I am excited to share that today we are announcing the VMware vSphere 6.7 Update 2 release, with key enhancements that will deliver an efficient and more secure hybrid cloud platform to our customers. We are also announcing the new...

/ April 2, 2019

How to Install Memcached (Caching Server) on CentOS 7

Memcached is an open source distributed memory object caching program that allows us to improve and speed up the performance of dynamic web applications by caching data and objects in Memory. Memcached is also used to cache entire database tables...

/ March 28, 2019

How to Secure a Website With the ‘Holy Trinity’ of Site Security

No matter how large or small your site is, or what niche it occupies, it’s likely to be the target for at least a few attacks over its lifespan. Protecting it is essential if you want to avoid losing data...

/ March 28, 2019

How to Setup Two Factor Authentication for SSH on Fedora

Every day there seem to be lots of security breaches reported where our data is at danger. Despite the fact that SSH is a secure way to establish a connection remotely to a Linux system, but still, an unknown user...

/ March 20, 2019

Facebook won’t let you opt-out of its phone number ‘look up’ setting

Users are complaining that the phone number Facebook hassled them to use to secure their account with two-factor authentication has also been associated with their user profile — which anyone can use to “look up” your profile. Worse, Facebook doesn’t...

/ March 4, 2019

The plot to revive Mt. Gox and repay victims’ Bitcoin

It was the Lehman Brothers of blockchain. 850,000 Bitcoin disappeared when cryptocurrency exchange Mt. Gox imploded in 2014 after a series of hacks. The incident cemented the industry’s reputation as frighteningly insecure. Now a controversial crypto celebrity named Brock Pierce is...

/ February 7, 2019

How to Check Integrity With AIDE in Fedora

AIDE (Advanced Intrusion Detection Environment) is a program for checking the integrity of a file and directory on any modern Unix-like system. It creates a database of files on the system, and then uses that database as a yardstick to...

/ January 29, 2019

Tiger – The Unix Security Audit and Intrusion Detection Tool

Tiger is a free, open source collections of shell scripts for security audit and host intrusion detection, for Unix-like systems such as Linux. It’s a security checker written entirely in shell language and employs various POSIX tools in the backend....

/ January 7, 2019