What-Is

DROWN: A Vulnerability That Can Imperil Your Encrypted Traffic

On 1 March 2016, security researchers announced a new vulnerability exploit involving an old security protocol, SSLv2, that affects up to 33% of web servers. Even web servers that do not allow SSLv2 connections might be vulnerable if the RSA private key used on the server is reused on other servers. And, as seems to […]

glibc (GNU C Library) Vulnerability (CVE-2015-7547) Patch and Information

On Tuesday, 16 February 2016, Google security researchers Fermin J. Serna and Kevin Stadmeyer announced the discovery of a vulnerability in the GNU C library (called “glibc” or “libc6”, depending on the specific platform) that underlies many Unix/Linux systems. Similar to the GHOST vulnerability, exploitation of this vulnerability involves a buffer overflow that can cause […]

What Is File Compression?

Target audience This article is good for general audiences and provides an introduction to data compression techniques and uses. . Introduction File compression is a technique for “squeezing” data files so that they take up less storage space, whether on a hard drive or other media. Many different kinds of software, including backup programs, operating […]

PHP7 Vs. HHVM

Origin Story of the Rivalry Between Facebook and PHP Back in 2010 Facebook developers announced that they had been working on a solution to the rising costs of running Facebook’s cloud servers. Due to the ever-growing resource demands being placed on Facebook, they needed to develop a solution that would not require them to make […]

What Is RAID?

Target Audience This article is an introduction to (or basic review of) storage options utilizing multiple computer disk drives. . Introduction RAID, (Redundant Array of Inexpensive Disks, or often now, Redundant Array of Independent Disks) encompasses an industry-standard set of enhanced data storage technologies. RAID combines the storage resources of several physical disk drives into […]

Solid State Drives (SSDs): A Non-Expert’s Guide

Target Audience This article is intended for non-specialists wanting to know a little bit more about SSDs. . Introduction The solid-state drive (SSD) is a relatively recent addition to the technologies available for mass data storage. In place of the spinning magnetic disk used in hard disk drives (HDDs) since the 1950s, an SSD relies […]

What is the cPanel TSR-2016-0001 Announcement?

Introduction On January 18th, 2016, cPanel announced a patch to address security concerns with cPanel and WHM (TSR-2016-0001).  This patch addresses 20 vulnerabilities in cPanel & WHM cloud hosting software versions 11.54, 11.52, 11.50, and 11.48. cPanel has rated these updates as having CVSSv2 scores ranging from 2.1 to 10.0.  Security level definitions can be located here. At […]

Networking Basics: Switches, Routers, and Firewalls

Target Audience This article is intended for those looking for a primer on basic networking terms and concepts. Introduction Switches, routers, and firewalls are electronic devices used to build data networks. They serve as essential components of the Internet, ferrying information rapidly from one computer to the next. In many commercial networks, a separate piece […]

Stateless and Stateful Models of Web Development

Target Audience Developers who are new to website programming or who might like a review of stateless and stateful models of site design. . Introduction The stateful and stateless models of software application behavior define how a user’s web browser communicates with a web server. In the earliest years of the Web, sites tended to […]

Backups: a Review of Basic Concepts

Target Audience This article is aimed at a non-technical audience looking for an introduction to or review of data backup options. . Introduction It’s a fact of life that computer files can be lost through human error or hardware crashes. A data backup is a process that duplicates a computer’s data files, creating copies that […]

Stay Connected With Us