Technology Made Simple
Tuesday June 27th 2017

Insider

Archives

‘Linux’ Archives

Q&A Monday: How often should I update my Linux Servers?

Q&A Monday:  How often should I update my Linux Servers?

Question: I have recently become responsible for more servers at my current job, some of these servers are of the  RedHat and Debian flavor of linux, and I was wondering what is the recommended period of time between checking for updates on these servers? Catina P. Martin Mira Loma, CA   Answer: To be honest, it all [...]

Upgrade BackTrack 5 R1 to the new R2

Upgrade BackTrack 5 R1 to the new R2

If you are anything like me, you hate to wait for things and here's a time you can get the information before the release.  BackTrack R2 will be released on March 1st 2012, but there are directions to make all the upgrades today, all you need to do is follow the directions below, and you'll get the newest kernel, security updates and tools [...]

Alternatives to Outlook

Alternatives to Outlook

    I've been asked about this more times than I can remember, so I figured I'd just do an article about it....What are some alternatives to Microsoft Outlook.  To fully disclose I still cling on to my Outlook for my windows machine, but I do use other software for my linux machines.  So I've done some testing and some asking around and found [...]

Linux: Disconnect a Stalled SSH Session

Linux:  Disconnect a Stalled SSH Session

    I've recently told everyone about my semi-switch over from an all Windows enviromnet to adding some Linux boxes to my regularly used boxes.  I've also been using SSH in Linux alot more, and every once in a while, I end up with a stalled SSH session.  In my Windows world, I'd just close puTTY and start again, not the same when I'm in [...]

Linux still for the Über Geek?

Linux still for the Über Geek?

  When I first tried getting into Linux almost 10 years ago, I found that is was hard to learn from the world of Windows that I had grown up learning.  If I haven't mentioned in the past, I have a horrible memory which makes remembering new commands in a OS I didn't use often, almost possible.  I tried for almost a year.  At the time, many [...]

Effectively Erasing Files

Effectively Erasing Files

Thinking about getting rid of a computer can actually be a lot more complicated that initially thought.  Many people remember to get their files off and delete any important information from the drive and think that's the end of it.  It's not just individuals, companies can also fall into this trap.  Just selecting delete does not mean that the [...]

Software Update: Firefox 3.6.7 and Firefox 3.5.11

Software Update: Firefox 3.6.7 and Firefox 3.5.11

The Mozilla Foundation has released Firefox 3.6.7 and Firefox 3.5.11 for Windows, Mac and Linux to address multiple vulnerabilities. These vulnerabilities may allow an attacker to execute arbitrary code, obtain sensitive information, bypass security restrictions, or conduct cross-site scripting attacks. Some of these vulnerabilities also affect [...]

Top 5: Most overlooked configuration items

Top 5: Most overlooked configuration items

No matter how prepared and how well documented the network is, sometimes techs forget some basic configurations sometimes.  It’s never intentional, but sometimes there are small configurations that we just need to double check.  Below is a list of some things that I’ve seen (and have) forgotten to double check when doing a [...]

Adobe Flash Update

Adobe Flash Update

Adobe has finally dealt with part of the security issues that it addressed earlier in the week. Adobe has finally updated their Flash Player with the release of version 10.1 (download here).  It is recommended that as soon as possible you update all your computer and servers. Note that this update does not fix the security issues that we also [...]

Google Release New Chrome 5.0.375.70

Google Release New Chrome 5.0.375.70

Google has released Chrome 5.0.375.70 for Linux, Mac, and Windows to address multiple vulnerabilities. These vulnerabilities may allow an attacker to execute arbitrary code, conduct cross-site scripting attacks, bypass security restrictions, or obtain sensitive information. I shouldn’t have to tell you, but I will anyway, if you are using an [...]

 Page 1 of 2  1  2 »