Total Uptime®
  • Products
    • ADC-AS-A-SERVICE (ADCaaS)

      Improve availability, security, performance and cloud integration for any application.

    • CLOUD DNS SERVICE

      Ensure 100% reliability of the most critical piece of the Internet. Name resolution.

    • CLOUD LOAD BALANCING

      Distribute traffic effectively to any cloud or any device while maintaining full control.

    • GLOBAL SERVER LOAD BALANCING

      Proximity-based routing to any device behind a single global anycast IP address.

    • WEB APPLICATION AND API PROTECTION

      Protect apps and APIs at the edge of the Internet from 15 classes of vulnerabilities.

    • MULTICLOUD NETWORKING

      Build a mesh of networks between sites wherever they are for the ultimate in control.

    • BGP Over GRE / VPN

      Get a static IP anywhere over standard ISP links where it is otherwise unsupported.

    • PROTECTIVE DNS SERVICE

      Protect your organization against malware, phishing, botnets and more at the gateway

  • USE CASES
    • DISASTER RECOVERY AND BUSINESS CONTINUITY

    • AUTOMATED ISP LINK FAILOVER

    • INCREASE APP AVAILABILITY

    • AUTOMATE DATA CENTER FAILOVER

    • DECREASE VENDOR LOCK-IN

    • NETWORK TRAFFIC ROUTING

    • GOVERNMENT DNS SERVICE

  • Pricing
    • SMALL BUSINESS

    • ENTERPRISE

  • Resources
    • BLOG

    • KNOWLEDGE BASE

    • ONLINE MANUAL

    • VIDEO TUTORIALS

    • API DOCUMENTATION

  • About us
    • OUR COMPANY

    • OUR CLOUD PLATFORM

    • OUR CUSTOMERS

    • CAREERS

    • NEWS ROOM

    • CONTACT US

    • PARTNERS

    • LEGAL INFO

  • Support
    • CREATE A TICKET

    • PLATFORM STATUS

    • KNOWLEDGE BASE

    • API DOCUMENTATION

  • Login
    • MANAGEMENT PANEL

    • SUPPORT PANEL

    • SECURE PAYMENTS

  • Contact Us!

The Uptime Blog

Generic selectors
Exact matches only
Search in title
Search in content
icon

Market Surveys from Disaster Recovery Journal and Forrester

“I only believe in statistics that I doctored myself.” Winston Churchill said a lot of things, but despite the rumors, fact checkers don’t believe he really originated this saying. It is actually a common joke in the German language that the Nazi propagandist Goebbels misattributed to the British leader. Another false quote did not really […]

icon

Drilling for Disaster Recovery

On an Air Force base in San Antonio, Texas, two men walk into the base exchange. They show their IDs to the clerks, don Halloween masks, and proceed to play the part of terrorists. “This is a drill! We want liberation!  This is only a drill!” Airmen shopping in the facility give them funny looks, […]

icon

Environmental Monitoring Just Keeps Getting Better

A data center has many components, but none are more critical than the environmental monitoring system. The technology infrastructure may be state-of-the-art, but if such things as heat or moisture are left unchecked, then all that expensive equipment could fail and cost unnecessary expenses and downtime. Data center managers must have an all-of-the-above strategy that […]

icon

Data Backup Is Not Optional

As with most information technologies, the concept of data backup is as deep as it is broad. That is to say, there are many dimensions and facets to the backup of data, and you can spend anywhere from a few days to a few months trying to get a handle on it. A definition is […]

icon

Zero Day Exploit Protection

They say what you don’t know can’t hurt you — but that’s not really true. One example is a zero-day exploit. This is a network vulnerability that hasn’t been identified yet, at least not by the people who need to fix it. These IT professionals have zero days to fix the problem because they don’t […]

icon

Protocol Anomaly Detection

It’s late at night and you’re walking to your car after attending a community event. Your car is still a block away. As you walk, you scan the scene before you. Something is just not right, you say to yourself. On the dark sidewalk ahead of you, you see two silhouettes. They are moving about, […]

icon

What You Should Know About APIs

We all know how a computer user interface (UI) works — at least in general terms. Humans interact with digital machines using input devices, and we watch everything real-time on computer monitors. When we think of user input, we usually think of Input devices like a mouse, keyboard, touchscreen, trackball, or pointing stick. But we […]

icon

Guarding Against Data Loss

In 2013, a U.S. military judge sentenced PFC Bradley Manning to 35 years in prison. His crime, as everyone knows, was leaking confidential information. Manning illegally downloaded data to a CD and gave it to Wikileaks. The intentional release of sensitive information is just one way that data loss occurs within an organization. Sometimes it […]

icon

And You Thought Your Transactions Were Safe: SSL Based Attacks

Your plaintext internet traffic is subject to attack. You already knew this.  And it probably won’t surprise you to learn that your encrypted internet traffic is also vulnerable. It’s an unfortunate situation. Carl Herberger, Radware’s VP for Security Solutions, says that the prospect of SSL-based attacks “makes a folly of our existing security infrastructure”. The […]

icon

Be on Guard for Forceful Browsers

When you go to a store to look around, the clerk may ask if they can help you. No, you’re just browsing, you say. You’re not necessarily in search of anything in particular. We do the same thing online. Web browsing is a way to satisfy our curiosity, to delve into areas that interest us, […]

icon

An Introduction to Form Field Manipulation

You use web forms all the time. All across the internet, you are called upon to give certain information about yourself in order to access a site, use an application, or purchase a product. And the truth is most of us have become more open to these kinds of interactions as we have become immersed […]

icon

Cookie Manipulation and Poisoning

Everybody loves cookies. They’re hard to resist — sweet and delicious. So why is something as flavorless as a computer cookie blessed with the same name? You can blame Lou Monulli. He created the technology for Netscape Communications and received a patent for it in 1998. In the beginning, nobody knew that cookies were being […]

icon

The Ghosts of Buffer Overflow

An enormous amount of due diligence.  That’s what it will take to overcome one of the most common computer security vulnerabilities that has been vexing cyberspace for years, according to John Clark of the University of York.  “To make buffer overflows a thing of the past will require an enormous amount of due diligence – […]

icon

CSRF and the Confused Deputy

Imagine that a smooth operator convinces Barney Fife — the famous sheriff’s deputy on TV — to unlock a Mayberry jail cell. Barney has the keys. He has the authority. He wants to do the right thing, but he’s easily confused and manipulated.  Your web browser has authority too.  It can do a lot of […]

icon

Attack of the Botnet Zombies

There have been plenty of zombie movies over the past few years. The plots are similar — the undead stalk the living — and the productions are generally not Oscar material. But somehow the threat hits a nerve with the general public. To illustrate a threat of a different kind, let’s come up with a […]

icon

Cross-Site Scripting (XSS) Exploits

JavaScript is a dandy programming language. And it’s very popular. A report from W3Techs shows that 94.7% of all websites surveyed used JavaScript. But it’s also vulnerable to a top web application hack called cross-site scripting (XSS). Unlike SQL injection, which targets the server side, XSS goes directly for unsuspecting web users. XSS injects malicious […]

« Previous 1 2 3 4 5 … 10 Next »
Total Uptime Technologies

+1 800.584.1514
+44 (0)330.808.0228
+1 828.490.4290

Products
  • ADC-as-a-Service
  • Cloud DNS Service
  • Cloud Load Balancing
  • Global Server Load Balancing
  • Web Application and API Protection
  • Multicloud Networking
  • BGP Over GRE / VPN
  • Protective DNS Service
Pricing
  • Cloud DNS
  • Load Balancing / Failover
  • Web App Firewall
Resources
  • Blog
  • Knowledge Base
  • Manual
  • Video Tutorials
  • API Docs
About Us
  • Our Company
  • Our Cloud Platform
  • Our Customers
  • Careers
  • News Room
  • Contact Total Uptime
  • Partner Programs
  • Legal Info
Support
  • Create a ticket
  • Platform Status
  • Knowledge Base
  • API Documentation
Log In
  • Management Panel
  • Support Panel
  • Secure Payments

2025 Total Uptime Technologies, LLC. All rights reserved.

Total Uptime® and the Total Uptime logo are registered trademarks of Total Uptime Technologies, LLC. All other trademarks and services marks are the property of their respective owners. [31.174]