DDoS attacks have become a fact of life. If you have a web presence, then it's only a matter of time before you find yourself dealing with the consequences of a DDoS attack.
The computer security world uses a lot of military language and concepts. This is not just because it "sounds good" but because there are many useful analogies to be found.
Scripts are the meat and juice of system administrators. Being able to make use of an extensive set of scripts suitable for different tasks is essential for a sysadmin. But how do you actually do the script management?
If you do any security monitoring, it's easy to get overwhelmed by the amount of events you need to track. You can start by doing longer hours, but eventually you'll end up in a swamp — sucked in to the point that workflow comes to a standstill.
Encryption keys are considered the key to the kingdom, both from a server-, service- and user-oriented approach. One of the most popular solutions for encryption keys is GnuPG, an implementation of the OpenPGP standard for encrypting and signing data and communication....
Most people in IT, especially security, have worked with some form of code. Whether it's for automating system tasks, performing network monitoring or developing full-fledged applications, understanding certain scripts is necessary to keeping support running every day.
In December 2015, the European Parliament and Council reached an agreement on the General Data Protection Regulation (GDPR) proposed by the Commission. The reform modernizes the principles from the 1995 Data Protection Directive and applies to personal data (cookies,...