INFORMATION TECHNOLOGY ARTICLES
You run a respectable website that your users can trust. Right? You might want to double check that. If your site is running on Microsoft Internet Information Services (IIS), you might be in for a surprise. When your users try to connect to your server over a secure connection (SSL/TLS) you may not be providing them a safe option.
Digitally signed drivers include an electronic fingerprint that indicates which company the driver was produced by as well as an indication as to whether the driver has been modified since the company released it. This increases security, as a signed driver that has been modified will no longer have an intact signature. Drivers are signed using code signing certificates.
When you need a data set for testing or demonstration, and that set needs to represent Personally Identifiable Information (PII), you generally don’t want to use real data that represents actual people. Here, we’ll walk you through how you can use PowerShell to generate a list of random names and phone numbers for just such an occasion.
We currently enjoy many wonderful bits of technology such as the internet, mobile phones, radar, and more, but how much of it was ‘predicted’ ahead of its time by science fiction authors? You just might be surprised! PBS Digital Studios looks at the predictions that came to pass, and which author was the most accurate of all.
The rsync protocol can be pretty simple to use for ordinary backup/synchronization jobs, but some of its more advanced features may surprise you. In this article, we’re going to show how even the biggest data hoarders and backup enthusiasts can wield rsync as a single solution for all of their data redundancy needs.
Iptables is an extremely flexible firewall utility built for Linux operating systems. Whether you’re a novice Linux geek or a system administrator, there’s probably some way that iptables can be a great use to you. Read on as we show you how to configure the most versatile Linux firewall.
We’ve previously written about hosting your own FTP server, but data is transferred in cleartext, making it unsuitable for confidential file transfers. In this guide we’ll go over the secure version of FTP – SFTP, and why it makes for an excellent way of transferring files to other people across the internet.
By default, Hyper-V tries to figure out which Virtual Machines were powered on at the time that your PC had its power cut. It uses this list to automatically turn Virtual Machines back on when your PC powers on. Here is how to change what gets switched back on.
You have most likely heard of services, such as Dropbox, which are used to keep files in sync across multiple machines. However, what if you want to perform this operation on a single machine? That is, keep files which have the same file name in sync across the machine such that when one of the files changes, they are all updated.
Geeks have had their own “money” for some time, but typically it is within the context of online gaming. While this digital currency does possess intrinsic value, the market for it is usually limited to other gamers. However, 2009 gave rise to another form of digital currency, bitcoin, which has demonstrated some global demand as a medium for exchange.