Creating an Active-Active VPN Tunnel with BGP in AWS

In this article we will outline the steps required to create an active-active VPN tunnel with BGP dynamic routing between Amazon Web Services (AWS) and the Total Uptime Cloud Platform. By default, Total Uptime requires your devices (servers) to have internet-routable IPv4 or IPv6 addresses so we can direct traffic to them. By creating VPN […]

Is Multicloud Networking just for connecting from TUT to my servers?

No, Multicloud Networking can be used for many different purposes. Here are the two most common: It can be used with the WAAP or Load Balancer to allow you to send traffic to devices using private, non-routable RFC1918 address space. Often this is desired if you are short on public IPv4 address space, or if […]

Top External Monitoring Tools in 2020

What is external monitoring? In a general sense, it means regularly checking on something to find out what is happening. It’s a way to gather information. In a large network, it means observing and recording data from a wide variety of devices and applications. We should clarify that monitoring and management are not the same […]

Controlling Your Hybrid Cloud Infrastructure

Abstract The only constant in information technology is change. Technical pioneers continue to come up with new ways of doing things. The latest developments in IT infrastructure, as demonstrated in industry studies, include an increased adoption of hybrid cloud computing. With that trend comes a greater need to find ways to control a widely distributed […]

How to Combat Ransomware to Stay Online

Recently we discussed the heavy cost of ransomware, both in the form astronomical ransoms that have been paid recently as well as the cost of dealing with the aftermath of an attack.  When it comes to most serious cyberattacks, a pound of prevention is worth a pound of cure.  The truth is that in most […]

Major CenturyLink Network Outage to Close 2018

We end the year with a major CenturyLink outage that started early Thursday morning for many and spread across the country, according to reports on Reddit, GeekWire and Newsweek affecting Internet, 911 services and other internet-dependent services like waves and VoIP. The outage also affected other providers who lease long haul connectivity from them, such […]

Global Internet Tracking Sites

As much as we like data, it’s very easy to become lost in it. But what if you could see the whole picture? That’s the idea behind internet tracking dashboards. They come in all shapes and sizes. Some are used only to demonstrate the global reach of internet security services, while others can provide useful, […]

Cross-Site Scripting (XSS) Exploits

JavaScript is a dandy programming language. And it’s very popular. A report from W3Techs shows that 94.7% of all websites surveyed used JavaScript. But it’s also vulnerable to a top web application hack called cross-site scripting (XSS). Unlike SQL injection, which targets the server side, XSS goes directly for unsuspecting web users. XSS injects malicious […]

Geo Zones Tab

GEO Zones give you the ability to deliver different IP Addresses to visitors based on geography. For example, you may have servers in Europe and the United States. GEO Zones can let you direct the same host name of www.example.com to different locations. For a visitor in London, they can be given an IP address […]

Proactive IT Maintenance to Minimize Downtime

No one needs to explain to you the virtues of being proactive. Of course, no one can make you (or this writer) do it either. You may know that you should change the timing belt on your car every 60,000 miles or so, but it’s even easier to do nothing about it — until your […]