Kansas City, KS, USA
Apr 16, 2019 | By Des Nnochiri
As with any other operating system, security is a prime concern with Linux network hardware. In this article, we’ll be giving some recommendations on how to toughen the security posture of your Linux servers. Screenshots and example syntax relate to systems running Kali Linux, CentOS, RHEL, Ubuntu, and Debian-based Linux distributions.
Mar 26, 2019 | By Zoë Dunning
As mobile and IoT deployments play an increasing role in enterprise networks, organizations are looking to more appropriate architecture—such as edge computing—to relieve their security and device management burdens. Edge computing is still in its relative infancy, and the platforms and services needed to orchestrate edge deployments are evolving themselves. In this article, we’ll be looking at some of the issues and available options.
Feb 26, 2019 | By Des Nnochiri
The Windows 10 operating system has had a reputation for poor design and lax practices on information privacy and security for some time. It’s debatable exactly how bad the OS actually is or isn’t in this regard. In this article, we’ll be exploring some methodologies and best practices for hardening the security status of your Windows 10 workstations and network configuration.
Feb 21, 2019 | By Doug N
Executive Summary: Practically unlimited remote desktop support for a one time cost of $125! Really? Sounds like a scam? No, we’ve had this underappreciated feature for years. Time to get the word out on how to take advantage of it!
Feb 19, 2019 | By Des Nnochiri
Within a Linux network or development system, launching a limited set of applications or services (often known as microservices) in a self-sustaining container or sandboxed environment is sometimes necessary. A container enables administrators to decouple a specific set of software applications from the operating system and have them run within a clean, minimal, and isolated Linux environment of their own.
Jul 20, 2018 | By PowerAdminSupport
See how you can download, install, configure and start using PA File Sight in under 15 minutes. Detect ransomware attacks, users copying files from the server and more. Audit who is accessing files or find out who deleted files on the server.
Jul 25, 2014 | By PowerAdminSupport
Using the Inventory Alerter monitor in PA Server Monitor can help you monitor for changes in your Anti-Virus software.
Jun 3, 2014 | By PowerAdminSupport
The Event Log Monitor can monitor one or more event logs on the system, including the standard Application, Security and System logs as well as custom event logs. You have complete flexibility in specifying which types of events are important to you and which types you'd like to ignore. In addition, you can manually add dynamic event sources (event sources that register themselves, add an event, and then unregister themselves).