Logs that grow in size uncontrollably can cause unintended consequences. If you keep ignoring the situation, it will only get worse until you run our of disc space, the system starts being unresponsive or processes begin to crash.
A fatal flaw in TCP on Linux hijacks HTTPS connections. Here is the fix
If you are running Linux kernel 3.6 or newer, anyone in the world on a network that allows IP spoofing can hijack your encrypted communications in less than a minute, with a success rate of 90%.
Here is how to fix it.
Optimizing Postfix access maps to block incoming spam based on sender’s address
Here is how you can improve your Postfix access maps in order to block incoming spam based on sender’s address.
How to Build a SELinux Module for MariaDB
When updating MariaDB, the popular successor to MySQL, you may, once upon a time, hit a roadblock which you won’t be able to track down in the error log. Even though web visitors get to see the plain text complaint “Can’t connect to the database”, the MariaDB server will be running just fine. Silent errors should be reason enough to suspect SELinux, the oftentimes dreaded and despised but equally popular Security-Enhanced Linux kernel module.
You’ve Got Mail: The Changing Landscape of Email Services and the Emergence of Unified Communications
In the universe of email and messaging, change is accelerating. The world of IT came up with a new marketable buzzword with earth-shaking repercussions: Unified Communications.
- « Previous Page
- 1
- …
- 5
- 6
- 7
- 8
- 9
- …
- 13
- Next Page »