• Using public networks properly


    I am going to write about the weak security of untrusted or unknown networks. What is considered as public network? Certainly if you use only protocols encrypted by default (like SSH, SMTPS, HTTPS, POP3S, IMAPS, FTPS, etc.), this article does not apply to you completely, but you may still consider some of my recommendations. What […]

  • Monitoring systems with Icinga (Nagios)


    Icinga is a popular, open source, enterprise IT infrastructure monitoring system that can monitor almost everything. It is able to notify the user and generate reports. By the way the weird name comes from the Zulu language, it means to look for, browse, examine. Icinga is a Nagios fork, here is the difference: link. (The features the community did not like have been improved.) Due to its […]

Back to Top