Blog Links: Security threats in 2016
A very interesting report from EFF about the state of Cryptography and security threats in 2016 in: Technical developments in Cryptography: 2016 in Review [paypal_donation_button]
A very interesting report from EFF about the state of Cryptography and security threats in 2016 in: Technical developments in Cryptography: 2016 in Review [paypal_donation_button]
Yet another acronym, DMARC (Domain-based Message Authentication, Reporting & Conformance). This became very important due to the high-profile phishing done by russian state sponsored hacking groups involving spoofed e-mail addresses. By sending e-mails that looked as coming from credible sources they were able to infect systems connected to political entities: Clinton campaign staff, democrat party… Read More »
This is a follow-up tutorial on the DRBD replication posts about resynchronization of sites after the failed DR site is recovered. More than a year ago I described in a long tutorial how to use DRBD in a real production environment and the challenges associated to it. See: DRBD based disk replication of a production… Read More »
This is a follow-up tutorial on the DRBD replication posts about resynchronization of sites after the failed PR site is recovered (DRBD split brain recovery). More than a year ago I described in a long tutorial how to use DRBD in a real production environment and the challenges associated to it. See: DRBD based disk… Read More »
This is a follow up tutorial on the DRBD replication posts about promoting the DR site as the main site when PR is failed. More than a year ago I described in a long tutorial how to use DRBD in a real production environment and the challenges associated to it. See: DRBD based disk replication… Read More »
This is a follow up tutorial on the DRBD replication posts about gracious role switching of live sites configured with DRBD replication. More than a year ago I described in a long tutorial how to use DRBD in a real production environment and the challenges associated to it. See: DRBD based disk replication of a… Read More »
The following is a very interesting post about different database technologies and when to use them. It is a good way read that helps you to explain to people that you do not have to use some DB tech only because is the new cool boardroom word 🙂 When to use Cassandra, MongoDB, HBase, Accumulo… Read More »
A great introduction to blockchain hype, void of all the marketing blah-blah and boardroom nonsense. A must read for anyone that wants to know what blockchain is all about. What is Blockchain Technology? A Step-by-Step Guide For Beginners [paypal_donation_button]
As I described in a previous post Apache: How to use reverse secure proxy to chain secure apache servers – updated I have a configuration of chained secure apache servers, where one of the servers provides https resources but also acts as a reverse proxy for another server providing https resources. On the first server… Read More »
One of the best introduction tutorial I have seen about a useful tool set. I am sick of all the empty marketing “pitches” I see daily. Oracle Trace File Analyzer (TFA) – An Overview Guide A must read for anyone that has to work with Oracle DB and needs to do a deep investigation of… Read More »