CloudInsidr

Cyber security, infotech

  • Subscribe!
  • Privacy Policy
  • Legal
  • Contact Us

Join us on Twitter: @CloudInsidr

  • news & alerts
    • events
    • industry analysis
    • industry gossip
    • people
  • cloud, edge & co.
    • AWS
    • administration & orchestration
      • web servers in the cloud
      • mail servers
      • databases
  • cybersec & warfare
    • encryption
  • blockchain
Home Archives for Cloud Insidr
WordPress Says Your Host May Have Disabled The mail() Function. Here Is How to Fix It.

Cloud Insidr 2016-02-14 Leave a Comment

WordPress Says Your Host May Have Disabled The mail() Function. Here Is How to Fix It.

Some WordPress installations stubbornly refuse requests for a password reset link, showing the user this error message instead:

The email could not be sent.
Possible reason: your host may have disabled the mail() function.

WordPress’ error massage is anything but insightful. The underlying cause usually involves SELinux. Let us introduce you to an easy fix that does not involve plug-ins or external email services. Buckle up.

[Read more…]

Filed Under: administration and orchestration, cloud, edge and everything in between, mail servers, NGINX, web servers in the cloud Tagged With: NGINX, postfix, SELinux, WordPress

How to Check CPU Credits Usage and Remaining Balance of a Burstable Performance Instance on AWS EC2

Cloud Insidr 2016-01-11 Leave a Comment

How to Check CPU Credits Usage and Remaining Balance of a Burstable Performance Instance on AWS EC2

For workloads that don’t require a consistent CPU performance but do experience spikes in service demand, Amazon’s AWS EC2 service offers Burstable Performance Instances. Their competitive pricing can contribute to considerable savings and improve service availability, but how do you know if you are getting a good deal? You don’t, unless you are able to verify your CPU credits usage and the remaining balance. Here is how to figure out what’s really going on.

[Read more…]

Filed Under: cloud, edge and everything in between Tagged With: AWS, burstable performance, CPU, EC2, instance

Juniper Networks’ Embarrassment Lives On in Its Flawed SSL Configuration

Cloud Insidr 2016-01-10 Leave a Comment

Juniper Networks’ Embarrassment Lives On in Its Flawed SSL Configuration

Recent revelations from the maker of networking gear Juniper Networks have shaken the industry: Juniper has identified unauthorized code in ScreenOS, its operating system that powers the NetScreen line of Juniper firewalls. Then last Friday, cryptography researchers revealed that Juniper has allowed changes to its code that could enable eavesdropping on encrypted virtual private network sessions of its customers.

Juniper Networks headquarters
Juniper Networks headquarters (provided directly by Juniper Networks under the Creative Commons Attribution-Share Alike 3.0 Unported License)

[Read more…]

Filed Under: cloud, edge and everything in between, cybersecurity and cyber warfare, industry gossip, news Tagged With: backdoor, firewall, password, SSH, SSL

The Open Source Community Mourns the death of Ian Murdock, the Creator of Debian

Cloud Insidr 2015-12-30 Leave a Comment

The Open Source Community Mourns the death of Ian Murdock, the Creator of Debian

Ian Murdock
Ian Murdock

The untimely death of Ian Murdock, 42, on Dec. 28, 2015, has shaken the Linux community and the world of Open Source.

„Linux old timer. Debian founder. Sun alum. Salesforce ExactTarget exec.“

is how Ian Murdock described himself on his blog at ianmurdock.com.

[Read more…]

Filed Under: people Tagged With: Debian, Docker, Ubuntu

In IT to “Support and Defend”: Why Cybersecurity Is a Battlefield and Microsegmentation is Your Friend

Cloud Insidr 2015-12-29 Leave a Comment

In IT to “Support and Defend”: Why Cybersecurity Is a Battlefield and Microsegmentation is Your Friend

The traditional perimeter-focused security model has outlived its active usefulness as evidenced by the never-ending array of security breaches that constantly push the envelope on our tolerance for administrative “malpractice” in IT.

From the various security breaches in the private sector that are by now too plentiful to enumerate, through the fingerprint-stained OPM disaster, to the recently leaked database of personally identifiable information on over 191 million registered voters (in other words: all of them): no vulnerability seems too obscure, no exploit too impractical, no hack too audacious for some keyboard-toting mercenary to take advantage of the collective naiveté–or is it sheer incompetence?–of those who are paid to protect and defend access to sensitive information. How in the world did these people get their jobs, how dare they draw a salary, and how can they sleep at night? And, even more importantly: are you, by any chance, one of them?

[Read more…]

Filed Under: cybersecurity and cyber warfare Tagged With: cybersecurity, cyberwarfare

  • « Previous Page
  • 1
  • …
  • 10
  • 11
  • 12
  • 13
  • 14
  • Next Page »

Subscribe

SSL/TLS Certificate Square (250 x 250)

Pearson Education (InformIT)

SSL/TLS Certificate Medium Rectangle (300 x 250)

©2022 CybrAnalytiqa OÜ

  • Content purchasing and syndication