DOCKER ON DEBIAN INSTALL TUTORIAL

Docker is a containerization platform that allows you to quickly build, test and deploy applications as portable, self-sufficient containers that can virtually run everywhere. Docker is de facto standard for container technology and it is an essential tool for DevOps engineers and their continuous integration and delivery pipeline. In this tutorial, we will guide you
Read More »

MICROSOFT LAUNCHES CLOUD-BASED DEVELOPMENT KIT FOR BLOCKCHAIN

Big tech is getting in on blockchain in a big way. Microsoft has launched a cloud-based blockchain development kit powered by Azure. “This kit extends the capabilities of our blockchain developer templates and Azure Blockchain Workbench, which incorporates Azure services for key management, off-chain identity and data, monitoring, and messaging APIs into a reference architecture that can
Read More »

REMOVE OLD UNUSED KERNELS ON CENTOS LINUX

Under normal circumstances, the number of installed and unused kernels does not affect the server’s performance. However, removing old unused kernels will free some disk space. If your server is configured with a separate /boot partition and you run into an issue with low disk space, removing unused kernels will provide a remedy. Check for current Kernel
Read More »

UBUNTU UPGRADE FROM 16.04 TO 18.04

The latest Ubuntu release, 18.04, marks an opportunity for both LTS users and people on the previous 17.10 release to update Ubuntu and take advantage of the latest features. Thanks to Debian’s upgrade process, it should be relatively simple to either upgrade Ubuntu 16.04 to 18.04 (both LTS) or to upgrade Ubuntu 17.10 to 18.04
Read More »

WOOCOMMERCE POPULAR WORDPRESS PLUGIN PATCHES CRITICAL VULNERABILITY

If you own an eCommerce website built on WordPress and powered by WooCommerce plugin, then beware of a new vulnerability that could compromise your online store. Simon Scannell, a researcher at RIPS Technologies GmbH, discovered an arbitrary file deletion vulnerability in the popular WooCommerce plugin that could allow a malicious or compromised privileged user to gain full control over the unpatched
Read More »

E-MAIL AS TOP ATTACK CHOICE

E-mail continues to be cyber-criminals’ vector of choice for distributing malware and phishing, according to a report released today by Proofpoint. The Quarterly Threat Report Q3 2018 found that the frequency of email fraud attacks and the number of individuals targeted per organization are continuing to rise. Credential-stealing banking Trojans comprised 94% of malicious payloads, and the number
Read More »

VESTACP COMPROMISED WITH DDOS MALWARE

The provider of an open-source hosting panel software admitted a security breach during which an unknown hacker contaminated the project’s source code with malware that logs passwords, open shells, and can launch DDoS attacks. “Our infrastructure server was hacked,” said a member of the Vesta Control Panel (VestaCP) team in a forum post. “The hackers then changed
Read More »