<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1678611822423757&amp;ev=PageView&amp;noscript=1">
Defrag This

| Read. Reflect. Reboot.

Posted on 09.12.18 by Dan Franciscus

The Future of Remoting in Windows - OpenSSH

With OpenSSH, you can remote into any operating system from any operating system. This is a wonderful thing!

Posted on 09.11.18 by Alex Jablokow

An Introduction to FIPS-140-2 Requirements

FIPS 140-2 is a requirements document that sets the minimum strength level for data encryption used in Sensitive But Unclassified (SBU) federal operating environments. But its influence goes far beyond this significant but delimited area.

Posted on 09.06.18 by Dan Franciscus

Anatomy of a Chocolatey Package

In this article, I will dive into a Chocolatey package to show the important components.

Posted on 09.06.18 by Ashish Tawade

3 Phases of Network Security

Network Security has multiple concepts. One such model is the Before-During-After concept, which I will break out into different phases. Specific to incident and problem management in IT, this methodology plays an important role for IT teams.

Posted on 09.05.18 by Adam Bertram

5 Cool New Features in MOVEit 2018 SP1

These five new features in MOVEit 2018 Service Pack 1 will increase the speed and security of your business' automated file transfer workflows. There are also new improvements to MOVEit's REST API!

Posted on 09.04.18 by Jeff Edwards

Video: How To Scan For—and Lock Down—Open Ports with WhatsUp PortScanner

Foot-printing your environment is the first step to identifying ways in which intruders can penetrate your network. Thankfully, we offer a free utility that helps with precisely this task! In this Snip, Anthony Howell shows you how to use Ipswitch's WhatsUp PortScanner...

Posted on 08.31.18 by Jeff Edwards

Breaking Down the GDPR's Data Protection Principles, Part 4: Integrity, Confidentiality, and Accountability

It’s been months since the EU’s landmark data protection regulation, the General Data Protection Regulation (GDPR) went into full effect. This means that companies around the world now have to be more careful about the way they handle personal data collected about...

Posted on 08.30.18 by Dan Franciscus

Running PowerShell Scripts in Puppet

There are times when you have a complex script that you just need to get into configuration management. Re-writing scripts into manifests is time-consuming, no doubt about it. In this article, I will show how to run PowerShell scripts from Puppet.

Posted on 08.29.18 by Nate Lewis

How to Choose a Network Configuration Management Tool

Network teams have a lot on their plate. No one’s disputing that. Today, network admins are provided with a wide range of network management tools that can make their job just a bit easier. That said, it’s not as easy as just picking out a solution and crossing your...

Posted on 08.29.18 by Greg Mooney

Monitor Dark Web Traffic with WhatsUp Gold 2018

Monitoring traffic on the dark web is the kind of thing that IT administrators worry about, but they can't do anything about. Now IT can pinpoint who and what is accessing the dark web from corporate networks with WhatsUp Gold 2018. 

Free Trials

Getting started has never been easier. Download a trial today.

Download Free Trials

Contact Us

Let us know how we can help you. Focus on what matters.

Send Us a Note

Subscribe to our Blog

Let’s stay in touch! Register to receive our blog updates.