
itsecureadmin.blogspot.com
Secure Systems AdministrationThis blog is a collection of notes that reflect personal experiences in systems and network administration. "Let all things be done securely."
http://itsecureadmin.blogspot.com/
This blog is a collection of notes that reflect personal experiences in systems and network administration. "Let all things be done securely."
http://itsecureadmin.blogspot.com/
TODAY'S RATING
>1,000,000
Date Range
HIGHEST TRAFFIC ON
Thursday
LOAD TIME
0.5 seconds
16x16
32x32
PAGES IN
THIS WEBSITE
19
SSL
EXTERNAL LINKS
3
SITE IP
172.217.10.65
LOAD TIME
0.517 sec
SCORE
6.2
Secure Systems Administration | itsecureadmin.blogspot.com Reviews
https://itsecureadmin.blogspot.com
This blog is a collection of notes that reflect personal experiences in systems and network administration. "Let all things be done securely."
Secure Systems Administration: 04/01/2008 - 05/01/2008
http://itsecureadmin.blogspot.com/2008_04_01_archive.html
This blog is a collection of notes that reflect personal experiences in systems and network administration. "Let all things be done securely.". Tuesday, April 22, 2008. Bash Tip of the Day! One very little known part of Bash is variable substitution and matching. Say you have a script where you want to use the value of a variable if it has a value, but use a default value if it is null, you can use the following example:. FILELIST=$(find /var/log/ -type f -name "*maillog*" -print). For file in ${FILELIST}.
Secure Systems Administration: Linux in the New York Times
http://itsecureadmin.blogspot.com/2007/10/linux-in-new-york-times.html
This blog is a collection of notes that reflect personal experiences in systems and network administration. "Let all things be done securely.". Thursday, October 04, 2007. Linux in the New York Times. There is a great article. In the technology section of the New York Times which talks about Linux and Ubuntu specifically. This is great coverage! Thursday, October 04, 2007. Subscribe to: Post Comments (Atom). View my complete profile. Linux in the New York Times.
Secure Systems Administration: Bash Tip of the Day! for loops
http://itsecureadmin.blogspot.com/2008/04/bash-tip-of-day-for-loops.html
This blog is a collection of notes that reflect personal experiences in systems and network administration. "Let all things be done securely.". Friday, April 18, 2008. Bash Tip of the Day! Today's tip covers Bash for loops. A simple operation that comes in handy with nearly EVERY shell script. For i in $(seq 1 10). Note that enclosing variables in curly braces is not required but will never let you down. Take the following code, for example:. Echo $i # works. Echo $i5 # won't work! Echo ${i}5 # works!
Secure Systems Administration: rootkit defense -- not so fast
http://itsecureadmin.blogspot.com/2007/03/rootkit-defense-not-so-fast.html
This blog is a collection of notes that reflect personal experiences in systems and network administration. "Let all things be done securely.". Sunday, March 04, 2007. Rootkit defense - not so fast. A recent demonstration at Black Hat DC by Joanna Rutkowska shows how hardware based rootkit defense may not be sufficient when facing an elite hacker. Rutkowska showed how the image of volatile memory as seen by the CPU can be different from the image in memory. Sunday, March 04, 2007. View my complete profile.
Secure Systems Administration: Fun with OpenLDAP, nscd, Cyrus-Imap, and Bind
http://itsecureadmin.blogspot.com/2007/03/fun-with-openldap-nscd-cyrus-imap-and.html
This blog is a collection of notes that reflect personal experiences in systems and network administration. "Let all things be done securely.". Saturday, March 03, 2007. Fun with OpenLDAP, nscd, Cyrus-Imap, and Bind. After updating a server this weekend, I restarted to verify that all services would come back up and that's where the fun started. The first issue I noticed was that Apache would not start. Nothing, I would issue a restart command:. Primary # /etc/init.d/apache2 restart. Mar 2 14:53:43 prima...
TOTAL PAGES IN THIS WEBSITE
19
IT Secure - Events, Workshops und Seminare powered by eyeT
STRATO
Direkt zur Hauptnavigation und Anmeldung. Sicher - erfolgreich - beraten. Maßgeschneiderte Security Services für die Konzeption,. Integration und Betrieb Ihrer Sicherheitslösungen. Managed Security Services - supported by eyeT. Visibility and Control. See IT. Secure IT. Expertise für die Konzeption, Planung, Umsetzung und Betrieb Ihres Security Managements. Modulares, individuelles Portfolio aus führenden. Bietet Unternehmen umfassenden Schutz von. Daten und Kommunikation. Ohne Einsatz von Hardware.
Информационная безопасность,IT новости,защита информации,сетевая безопасность,уязвимости,борьба со взломом,it новости
CreepyDOL, или Как собрать конфиденциальную информ. Новый шпионский вирус угрожает госучреждениям. Apple одержала победу над Samsung в Японии. Quest Software для Active Directory ключ к безоп. УЗИнфо - программа врача УЗИ. Gartner признает Quest Software одним из лидеров в. Barracuda Web Filter 6.0. Социальные сети: казнить. Quest Software выпускает Foglight для приложений W. Банк Софийский выбрал решения Kerio Technologies. Решения Firemon для управления гетерогенными систе. Пару раз в неделю. Атакующую...
IT Computer Security - New home
Welcome to IT Secure. Where computer experts become your affordable team. Click here to find out more! Let your problems be handled by an unique solution. At IT Security we focus at the best quality in customer satisfaction. Create a free website.
Secure Systems Administration
This blog is a collection of notes that reflect personal experiences in systems and network administration. "Let all things be done securely.". Tuesday, April 22, 2008. Bash Tip of the Day! One very little known part of Bash is variable substitution and matching. Say you have a script where you want to use the value of a variable if it has a value, but use a default value if it is null, you can use the following example:. FILELIST=$(find /var/log/ -type f -name "*maillog*" -print). For file in ${FILELIST}.
ITSA Consulting, LLC – Information Technology, Secure Administration
ITSA Consulting, LLC. Information Technology, Secure Administration. At ITSA Consulting, LLC, I specialize in automating the deployment of services to Amazon Web Services and Rackspace Clouds using Jenkins. Contact me to find out how I can help you. Check out my blog. For common issues and how-to articles. My office is located near Onalaska, WA – if you’re near there, Chehalis, Centralia, or Morton, give me a call, and I can manage your business IT needs on-site. Proudly powered by WordPress.
Welcome itsecured-uk.com - Justhost.com
Web Hosting from Just Host. Design By Design Fusions.
NetSecured
Securing your route to growth. Now for obligation-free quotation. Continuity, Security & Risk Mitigation for SMEs & Charities. Improving business efficiency, major crisis management and business continuity, security auditing and risk mitigation. Our primary focus is on the strategic enhancement of business processes, services and infrastructure, locally or on the internet to grow organisations. Through gaining a competitive advantage and/or taking cost saving measures. Prevention is better then cure.
www.itsecuredns.com :: Create By ReachController.com
This Site is Under Construction. Reach Controller (Windows Hosting Controller).