Tag: Access Control
The Best Open Source Storage Solutions: An Overview
Millions of bytes of data are being generated every moment, every day, around the world, and this volume will only increase in the future....
Secure Your SCADA Network Using Honeypot
Supervisory Control and Data Acquisition (SCADA) is an integrated part of a process control network. By actually damaging some critical infrastructure assets, including a...
Cyber Attacks Explained: Web Exploitation
Websites are no longer merely about having an "Internet presence" today, but are also used for commercial transactions and to transfer sensitive data. Such...
Guard Your Network with IPCop, Part 3: Block Outgoing Traffic
The first article in the series discussed IPCop 1.4.21, its basic installation and configuration. Though an excellent firewall distro, basic IPCop has limited functionality....
Gitolite: Administer a Central Git Repository without Going Insane
Over the past few years, centralised version control systems like SVN have steadily given way to distributed systems like Git or Mercurial -- the...