By:


Date:
Feb 19, 2016
The Vulnerability: Recently, security researchers working for Google and Red Hat announced a vulnerability in a library commonly used in Linux environments.  Specifically, Glibc getaddrinfo() is susceptible, under certain conditions, to a stack-based buffer overflow attack while performing DNS queries.  This vulnerability has been designated CVE-2015-7547. Who is Affected? Any server running Linux with glibc 2.9 or later is affected.A complete list of the linux distributions affected can be found on the nixCraft community site. What do I need to do? If you are a Proactive Managed customer, we… Read More
By:


Date:
Feb 9, 2016
Finding the right place for your apps to live is like shopping for real estate, with choices between owning, renting, and hybrid models. Owning your own home is like owning your own data center. Alternatively, a hotel lets you use as many rooms as you need without much of a commitment, which is like parking your applications in the public cloud. And hybrid clouds are somewhere in the middle. Owning a Data Center and Owning a Home Running your own data center is similar to… Read More
By:


Date:
Jan 27, 2016
Overview Running a business SaaS platform is hard enough, but nearly impossible with a hosting partner that doesn’t understand your business. Founded in 2014, WyWare had the vision of empowering businesses to track and control operations based on data, without having to invest in bloated enterprise SaaS systems. Its InCHECK platform enables custom software development services and practical technology solutions to provide businesses the flexibility to build and use only features they need. Challenge WyWare made the choice that many developers have: Amazon Web Services… Read More
By:


Date:
Jan 22, 2016
If you’re running a server or desktop with Linux Kernel 3.8 or higher, you and your website or application are vulnerable to a very serious 0-day local privilege escalation vulnerability. Millions of Linux systems around the world are vulnerable to compromise and must be patched. What Damage Can the Linux Vulnerability Cause? This bug (referred to as CVE-2016-0728) affects the keyrings facility in the kernel, allowing the kernel to cache security data, authentication keys, and other sensitive data. The bug creates a leak in the… Read More
Scott Oertel
By:


Date:
Jan 20, 2016
Many of us make resolutions at the beginning of each year, as a matter of tradition and self-improvement. Developers aren’t the only technologists that need resolutions to guide a new year. As a system administrator, you may find a never-ending list of updates, system checks, security patches, and performance benchmarking. Now is a fantastic time to implement new strategies into your career and day-to-day routine as a systems administrator to make your job more streamlined. At the end of the day (and hopefully at the… Read More
By:


Date:
Jan 15, 2016
Codero Hosting closed out a fantastic 2015 on another high note, ranking seventh in Netcraft’s global hosting reliability rankings for December 2015. Netcraft’s rankings prove Codero is one of the world’s most reliable hosting providers, ahead of many of its direct competitors. Codero earned top spots in Netcraft’s rankings for much of 2015 and anticipates maintaining the trend by continuing its dedication to reliability and exceptional service in 2016. [caption id="attachment_8817" align="aligncenter" width="630"] Table 1: Netcraft's Top 10 Most Reliable Hosting Companies in December 2015[/caption]… Read More
Stan Antov
By:


Date:
Jan 14, 2016
A new year has arrived, and it's time to decide what big things you want to do this year. I am doing so myself as both a developer and as a manager of developers. I am not talking about day-to-day tasks, but rather the “big picture” stuff. If you could go back a year and start preparing and setting up goals to achieve as the year kicked off, what would you change? This objective-making is called a resolution, and while there are many personal resolutions… Read More
By:


Date:
Jan 4, 2016
Originally posted on the WHIR.  Perspective is always important when picking technologies to base the future of your company’s IT on. Technologies go through generations of improvements along multiple dimensions before they reach true ubiquity. Take the disk drive as an example. First built in 1953 by IBM, each new generation of disk drives replaced larger, more sensitive, and more cumbersome devices. The cost also dropped precipitously with every generation. Not many people remember, but the earliest drives were usable only in the protected environment… Read More