An interesting and seemingly overly complicated way to get this going. http://www.linuxfocus.org/English/March2001/article199.shtml
The following was suggested from http://www.tacticalgamer.com/hardware-software-discussion/88770-byte-level-replication-under-linux.html “Re: Byte Level Replication under Linux Update: After quite a bit of research and product trials I came down to a few solutions. One of which was not actually replicating the data on our RHEL server but just doing normal byte level replication inside the Windows hosts that we run under VMware on the RHEL box. That proved to be costly as software like DoubleTake isn’t cheap. We would also need a pair of licenses for every Windows host Continue reading →
For the most part, these two programs will get your average spyware / trojans: MalwareBytes Anti-Malware http://www.malwarebytes.org/ Spybot Search & Destroy http://www.safer-networking.org/en/home/index.html If it goes beyond that, call us!
Just a quick note for anyone using Ubuntu 8.04 Use this in terminal instead. sudo rm -rf ~/.local/share/Trash/files/* Add in the “v” if you want to see it in action sudo rm -rfv ~/.local/share/Trash/files/*
We are constantly buying new domain names and often are asked by our customers where they should buy their domains. There is one answer for your next domain name registrar: name.com Just make sure you take advantage of domain name privacy (whois privacy or private whois). This protects your identity as the domain owner. Most people put their home address and their email address on the whois information and it makes it real easy to find you and your family. Here are variux we are Continue reading →
Here is the quick and simple way to encrypt and protect what you are sending and receiving over the network whether you are at home or at a wifi hotspot. This is a simple proxy over an SSH connection. You will need the following to do this (works for any platform): PuTTY for your platform A server that supports SSH (either set up at home or your web host) That’s it! First set up PuTTY to connect to your SSH server but also set the Continue reading →
Today we have completely locked down our Credit Card encryption system! Because I’m an absolute freak about security on the Client system of var!ux, John (with the help of Sarah, I’m sure) created a highly secure hash to house our client’s sensitive data. Is it unbreakable? Well, we’ve certainly made it a rough beast to try and wrestle! Now it is up to you to keep your passwords safe by keeping them only in your head or listed in a secure place that is secured Continue reading →