Home
What is a Slowloris Attack
Written by David Noel-Davies   

Back in the year 2009, there were a series of cybersecurity incidents in Iran that were carried out against Iranian government websites by hacktivists in the region. The primary form of attack? Something called a Slowloris attack. Despite the benign-sounding name, a Slowloris attack can be quite effective when deployed properly. It is not able to easily be detected by normal network security defenses, which makes it very difficult to defend against. The fact that it was 2009, don't let that fool you, its still just as effective today as it has always been.

Read more...
 
What is an HTTP flood attack
Written by David Noel-Davies   

HTTP flood is a type of Distributed Denial of Service (DDoS) attack in which the attacker exploits seemingly-legitimate HTTP GET or POST requests to attack a web server or application.

HTTP flood attacks are volumetric attacks, often using a botnet “zombie army”—a group of Internet-connected computers, each of which has been maliciously taken over, usually with the assistance of malware like Trojan Horses.

Read more...
 
How does a web application firewall (WAF) work?
Written by David Noel-Davies   

A WAF protects your web apps by filtering, monitoring, and blocking any malicious HTTP/S traffic traveling to the web application, and prevents any unauthorized data from leaving the app. It does this by adhering to a set of policies that help determine what traffic is malicious and what traffic is safe. Just as a proxy server acts as an intermediary to protect the identity of a client, a WAF operates in similar fashion but in the reverse—called a reverse proxy—acting as an intermediary that protects the web app server from a potentially malicious client.

Read more...
 
3 tips for success with a WAF
Written by David Noel-Davies   
Here are three tips to ensure that your business successfully maximizes the benefits of a WAF:

Read more...
 
Web Application Security
Written by David Noel-Davies   

A WAF can provide critical protection for any online business that must securely handle private customer data.

Businesses typically deploy a WAF to shield their web applications from sophisticated and targeted attacks, like cross-site scripting (XSS) and SQL injection, that might result in fraud or data theft.

When successful, these types of incursions can severely compromise customer confidence and even result in regulatory penalties. The added protection that a WAF provides can help safeguard a company’s reputation and position in the market.

Read more...
 
Tools to administer MS Exchange ...And they are free !
Written by David Noel-Davies   

Some free tools that can help simplify Microsoft Exchange deployment, troubleshooting, and administration. Some of the tools are simple—but still convenient—whereas others provide some powerful functionality.

There are some tools you can use during deployment to ease the process and reduce issues in the future, tools you can use for troubleshooting to reduce down-times, and tools you can use during day-to-day administration to monitor server health and perform tasks.

Read more...
 
5 IT Career Mishaps
Written by David Noel-Davies   

Just because you've landed that dream job or received that promotion doesn't mean you can rest on your hands. It's just as important to keep working on the skills, values and goals that helped land you that job in the first place, even after you've been hired. Here are five top tips for avoiding career mishaps.

Read more...
 
Popular Chrome extensions being purchased for misuse and for aggressive advertising
Written by David Noel-Davies   
A new trend in purchasing successful Chrome extensions for Adware and/or general misuse is the new 'in' for spammers, CIO.co.nz reports. Spammers buy Chrome extensions and turn them into adware
 
Event ID error 57 several times followed by error 137
Written by David Noel-Davies   
I found some error 57 several times followed by error 137. This pattern repeated itself every five seconds. The server was experiencing no problems other than this repeating error message. What could it be?

Turns out that this error is documented as appearing in more than 2008R2. Specifically, it can happen with Vista, Windows 7, and with 2008 release candidate one. The underlying cause is a corrupted file, which can be easily reset.

Read more...
 
ITIL top 5 provided benefits
Written by David Noel-Davies   
ITIL top 5 provided benefits

ITIL is the world’s leading framework of service management best practices. Many top performing organizations around the world are implementing ITIL practices. Why Is this? 

 

Read more...
 
Microsoft BYO's Offering
Written by David Noel-Davies   

One of the biggest trends in IT today is that Bring Your Phone Device trend. Unless you have been living under a rock, you know that users are demanding to be able to access corporate resources from personal consumer electronics devices. Furthermore, they expect access whether they are working on premise in the office, or remotely.

Read more...
 
The Seven Critical ITIL Success Factors / Enabler
Written by David Noel-Davies   

The following list represents these seven Critical Success Factors / Enablers:

 

1. Leadership: Executive and senior level support, sponsorship and active participation

2. Resources: Access to necessary project and on-going process resources (time, people, funding)

3. Knowledge & Skill: The level of communication, information, knowledge and skill related to ITSM

4. Integrated Tools: Availability of integrated ITSM tools to support process workflow and automation

5. Ability to Deploy: The political capability to deploy new policies, processes and tools across organizational silos

6. Ability to Affect Behavioural Change: Changing organizational behaviour/culture and ensuring compliance to new practices over the long term

7. ITSM Program Momentum: Sustaining momentum, priority and funding for the ITSM programs

Read more...
 
<< Start < Prev 1 2 Next > End >>

Results 1 - 16 of 18
Powered by IT CONTRACTORS and designed by EZPrinting web hosting