A data center has many components, but none are more critical than the environmental monitoring system. The technology infrastructure may be state-of-the-art, but if such things as heat or moisture are left unchecked, then all that expensive equipment could fail and cost unnecessary expenses and downtime. Data center managers must have an all-of-the-above strategy that […]
As with most information technologies, the concept of data backup is as deep as it is broad. That is to say, there are many dimensions and facets to the backup of data, and you can spend anywhere from a few days to a few months trying to get a handle on it. A definition is […]
They say what you don’t know can’t hurt you — but that’s not really true. One example is a zero-day exploit. This is a network vulnerability that hasn’t been identified yet, at least not by the people who need to fix it. These IT professionals have zero days to fix the problem because they don’t […]
We all know how a computer user interface (UI) works — at least in general terms. Humans interact with digital machines using input devices, and we watch everything real-time on computer monitors. When we think of user input, we usually think of Input devices like a mouse, keyboard, touchscreen, trackball, or pointing stick. But we […]
In 2013, a U.S. military judge sentenced PFC Bradley Manning to 35 years in prison. His crime, as everyone knows, was leaking confidential information. Manning illegally downloaded data to a CD and gave it to Wikileaks. The intentional release of sensitive information is just one way that data loss occurs within an organization. Sometimes it […]
JavaScript is a dandy programming language. And it’s very popular. A report from W3Techs shows that 94.7% of all websites surveyed used JavaScript. But it’s also vulnerable to a top web application hack called cross-site scripting (XSS). Unlike SQL injection, which targets the server side, XSS goes directly for unsuspecting web users. XSS injects malicious […]
Total Uptime gives you the ability to load a SSL certificate and key pair for use in SSL offload or decrypting the SSL session in order to insert client IP headers. This article describes the process of retrieving your certificate and key files from a Linux web server, uploading them, and pairing them in our […]
Controlling traffic is a key facet of internet management. Sometimes primary connections will go down. Or too much traffic may cause congested links or overwhelmed devices to become unusable. We wrote about the implementation of load balancing in the cloud in a 2017 blog post. When people think of load balancing, they usually think about traffic that […]
Not interested in reading the manual? We cover the essentials in a video at the bottom of this page! To begin, you need to create a WAF Profile. To do that, click the ADD button on the toolbar in the table as shown below: Give your profile a name that describes the functionality you are […]
You can search for a specific alert by using the “Search” button. Select the FIELD you’d like to search in the first box, HOW to search in the second box and enter the string you’d like to search FOR in the third box. Field: To make use of the Search function, select the […]