Environmental Monitoring Just Keeps Getting Better

A data center has many components, but none are more critical than the environmental monitoring system. The technology infrastructure may be state-of-the-art, but if such things as heat or moisture are left unchecked, then all that expensive equipment could fail and cost unnecessary expenses and downtime. Data center managers must have an all-of-the-above strategy that […]

Data Backup Is Not Optional

As with most information technologies, the concept of data backup is as deep as it is broad. That is to say, there are many dimensions and facets to the backup of data, and you can spend anywhere from a few days to a few months trying to get a handle on it. A definition is […]

Zero Day Exploit Protection

They say what you don’t know can’t hurt you — but that’s not really true. One example is a zero-day exploit. This is a network vulnerability that hasn’t been identified yet, at least not by the people who need to fix it. These IT professionals have zero days to fix the problem because they don’t […]

What You Should Know About APIs

We all know how a computer user interface (UI) works — at least in general terms. Humans interact with digital machines using input devices, and we watch everything real-time on computer monitors. When we think of user input, we usually think of Input devices like a mouse, keyboard, touchscreen, trackball, or pointing stick. But we […]

Guarding Against Data Loss

In 2013, a U.S. military judge sentenced PFC Bradley Manning to 35 years in prison. His crime, as everyone knows, was leaking confidential information. Manning illegally downloaded data to a CD and gave it to Wikileaks. The intentional release of sensitive information is just one way that data loss occurs within an organization. Sometimes it […]

Cross-Site Scripting (XSS) Exploits

JavaScript is a dandy programming language. And it’s very popular. A report from W3Techs shows that 94.7% of all websites surveyed used JavaScript. But it’s also vulnerable to a top web application hack called cross-site scripting (XSS). Unlike SQL injection, which targets the server side, XSS goes directly for unsuspecting web users. XSS injects malicious […]

How to Install a SSL Certificate

Total Uptime gives you the ability to load a SSL certificate and key pair for use in SSL offload or decrypting the SSL session in order to insert client IP headers.  This article describes the process of retrieving your certificate and key files from a Linux web server, uploading them, and pairing them in our […]

Internet Load Balancing and Failover for Multiple ISP Links

Controlling traffic is a key facet of internet management. Sometimes primary connections will go down. Or too much traffic may cause congested links or overwhelmed devices to become unusable. We wrote about the implementation of load balancing in the cloud in a 2017 blog post. When people think of load balancing, they usually think about traffic that […]

Web Application Firewall

Not interested in reading the manual? We cover the essentials in a video at the bottom of this page! To begin, you need to create a WAF Profile. To do that, click the ADD button on the toolbar in the table as shown below: Give your profile a name that describes the functionality you are […]

Search for Service Alerts

You can search for a specific alert by using the “Search” button. Select the FIELD you’d like to search in the first box, HOW to search in the second box and enter the string you’d like to search FOR in the third box.   Field:   To make use of the Search function, select the […]