Archive for the “Security” Category

Protecting SSH With Denyhosts

by Hayden Smith

SecureSHell (SSH) is one of the most important tools on a Linux server, and can  be managed remotely from anywhere with an internet connection. Unfortunately, because a user with access to a server via SSH can have full control of that server, this makes SSH a common target for hackers to attack. Restricting IP Addresses…

Road Warrior OpenVPN Part 3

by Hayden Smith

In our previous articles in this series, we’ve looked at configuring OpenVPN on your VPS in order to provide a method to protect your internet connection when using wifi hotspots for internet access. Last time we got the OpenVPN server up and running, and this time we’ll look at getting the configuration done for client certificates…

Road Warrior OpenVPN Part 2

by Hayden Smith

In part 1 we looked at getting OpenVPN set up and configured on your VPS as a way to encrypt and protect your traffic when utilizing wifi hotspots. In this part we’ll continue to work on that. Last time we left off having tweaked the OpenVPN configuration to meet our needs. Next we need to…

Road Warrior OpenVPN

by Hayden Smith

When working remotely one of the most important things about connecting to the internet is ensuring that your connection is secure. If you are using public wifi hotspots to reduce your mobile data bill, then it’s safe to say that your connection may often be far from secure. The Risk of Public Wifi Many locations…

A Road Warrior’s Companion

by Hayden Smith

When it comes to the public cloud, the majority of VPSs are used for websites, email and databases. They are often used as a stepping stone for customers that have outgrown shared web hosting services or require more custom configuration than these shared environments provide, but who don’t need the power or cost of a…

Proxy vs VPN: What’s the Difference?

by Hayden Smith

On the face of it, it appears that both proxies and VPNs provide the same services. In reality they are quite different tools with very different purposes. Let’s have a look at them and see what the differences are between them. We’ll start with the proxy server. A proxy server acts as an intermediary between…

Issues Raised By Apple Ransomware

by Neil Cumins

We have long believed Apple to be impenetrable, but this is no longer the case…

Posted in Security, WebsiteComments Off on Issues Raised By Apple Ransomware

How Secure Are Your Passwords?

by Madeleine Bruce

It’s very difficult to go even ten minutes in an online world without having to enter a password. Whether it’s something sensitive like banking or email, or something entirely innocuous like ordering a pizza, the password has become the currency of the internet. Though our attitudes have become very laissez-faire, even slightly irritated towards the…

Posted in SecurityComments Off on How Secure Are Your Passwords?

Is The Smart Home Really That Secure?

by Madeleine Bruce

Placing our domestic security into the “hands” of our devices is risky. It’s a trend that’s been gaining traction for some time now, and all signs point to the future as being the era of the “smart home”. In this idyllic vision, consumers won’t have to remember to turn off the heater or when it’s…

Posted in SecurityComments Off on Is The Smart Home Really That Secure?

over 200,000 servers launched

and counting worldwide...