Networking


Few important methods to keep servers safe

Most of today’s spam and phishing are sent by cyber-criminals leveraging breached servers or vulnerabilities exploited in the wild. Therefore we have gathered a list of best practices for sysadmins in an effort to combat, not the symptoms, but the real cause of spam. Nowadays when vulnerabilities are piling one on top of the other and cyber-criminals love to break and corrupt any system they get their hands on, the top priority for sysadmins is to secure the servers they manage. First of all, carefully choose your poison. Whether it’s a Linux......

Continue Reading