What Cybersecurity Threats Do We Face In The Cloud?
Last week I wrote that compliance and complacency are major challenges in the cloud. Yes, defensive technology is the same. However, the cloud poses some specific threats. Multitenancy Multitenancy scares people the most. You share cloud infrastructure with other customers. Your cloud services are running on virtual machines. Those VMs run on shared hardware. You […]
What do Clocks, Cars, and Warships have in Common?
A few months ago we had Daylight Savings Time. My parents were delighted to discover that “the clock” in their car automatically adjusted itself, as did their computer. But now they had to change the two clocks in their bedroom, the two clocks in the kitchen, and several others around the house. How did the […]
What’s Happening To The CompTIA Security+ Exam?
I recently taught Learning Tree’s CompTIA Security+ test-prep course and a student asked a question I couldn’t answer. This wasn’t a technical question. If it had been, I would have known the answer or else I could have found it. But he asked: “Look, I do desktop support. I help set up and move desktop […]
Using Linux Containers and Docker for Reliable Service
From time to time, I need to access the web server belonging to a company I do some work for. It’s only used by their employees plus consultants like me, so it’s pretty basic. Just enough to get the job done. The main page carries this warning: This web site will be down for maintenance […]
Avoid Graphical Slowdowns
The top program displays a constantly updated list of running processes ordered, by default, by CPU usage. Its name comes from its intended use: display the processes that are the top users of system utilization. The joking explanation is that it’s called “top” because it’s always at or near the top of its own output. […]