Set the preferred site for Windows Server 2016 clusters
Configure the preferred site for a Windows Server 2016 cluster.
read more Continue reading Set the preferred site for Windows Server 2016 clusters
Collaborate Disseminate
Configure the preferred site for a Windows Server 2016 cluster.
read more Continue reading Set the preferred site for Windows Server 2016 clusters
This free PDF based eBook will walk you through all aspects of configuring Microsoft Intune.
read more Continue reading Free E-Book – Microsoft Intune Step by Step
What are the main advantages of using LibreSSL vs OpenSSL?
As I understood LibreSSL is a fork of OpenSSL:
LibreSSL is a version of the TLS/crypto stack forked from OpenSSL in 2014, with goals of modernizing the codebase, improving sec… Continue reading What are the main advantages of using LibreSSL versus OpenSSL
I’m developing a desktop application and it required connecting to a remote MySQL database server, currently I save all information (server IP, TCP port, username, password, database name) needed for the connection in a configuration file … Continue reading Secure way to save password in configuration file
I read the following post, and while the questions was specific to SkyRim, the more general answer was that it depends on the game. I wanted to pose a more generic question here to the security folks.
The main concern seemed to be the typ… Continue reading Gaming Mods Security Risks
I’m researching OS hardening and it seems there are a variety of recommended configuration guides. I realize the different configuration providers supply different offerings per Operating System, but let’s assume (for conven… Continue reading Difference between hardening guides (CIS, NSA, DISA)
BREACH, a new attack on SSL that targets HTTP compression, has recently been publicly announced.
I manage a few web servers. How can I audit them to check which of them are potentially vulnerable to BREACH? Is there a simple way to scan… Continue reading How to audit web servers for resistance/vulnerability to BREACH
How can I disable DSA and ECDSA authentication on my server with OpenSSH 5.9? Sifting through the documentation material and doing a web search didn’t yield any results – only an old bug report for the Debian package here (an… Continue reading Disabling authentication via DSA keys in OpenSSH?
How can I disable DSA and ECDSA authentication on my server with OpenSSH 5.9? Sifting through the documentation material and doing a web search didn’t yield any results – only an old bug report for the Debian package here (an… Continue reading Disabling authentication via DSA keys in OpenSSH?
When setting up a server, what configuration changes do I need to make sure that all of the software uses /dev/urandom instead of /dev/random?
Some servers don’t have much entropy in the entropy pool (e.g., VPSs). If a software component… Continue reading What do I need to configure, to make sure my software uses /dev/urandom?