This video and article will show you how easy it is to make a copy of a DVD or Blu-Ray Disk to an ISO file so you can play it with a media player such as VLC. Once you have the ISO file you can also use it to BURN other DVD's so you can have a backup copy. It is very simple and works really slick!
TrueNAS (formerly FreeNAS) and XigmaNAS are great NAS servers for your Home and/or Office environment. One of the problems is that both of these NAS Servers recommend you to use a USB key to boot and then configure your drives as storage only in whatever RAID or Non-RAID configuration you wish. What if the USB boot device fails? It would be nice if you could make a copy of the USB bootable device, and to do so automatically rather than making them manually. You can! Thanks to the script we have developed using the dd command.
Have you ever had to copy and paste something into LibreOffice but then you are left with a bunch of annoying gray boxes throughout your document. The following article and video will show you what causes them and how to get rid of them.
Today we see more and more websites being compromised, therefore it is vital that you do some sort of Security Audit to see if your Website or Webserver is vulnerable to hackers. There are two routes you can take depending on your budget. You can pay a professional firm to do the audit or you can do a basic security check yourself using FREE tools that are readily available on the Internet.
Today more and more websites are getting compromised and vital important data is being exposed to hackers. Most of this is due to misconfiguration or lack of protection from the hosting company or a web designer that just wants to make the site work. If you are a website owner ensure that your webdesigner and server administrator protects your website from Clickjacking, code injection, MIME types, XSS (cross-site scripting), etc.
Securing your Website or Webserver is very important. If you are using Cloudflare to speed up and protect your network from Bot's, DDoS attacks, along with protecting certain area's of your site such as an admin or protected area, you may be well aware that Hackers can bypass cloudflare by obtaining the real IP of your server or website. You can essentially block all traffic from the Internet and allow only Cloudflares NetBlock's. This Blog post will show you how to do exactly that.
If you are a Web Developer you know that Cloudflare's Cache can be very annoying. Did you know your can modify your hosts file so that you can bypass networks such as Cloudflare, Fastly or Akamai? This is helpful if you wish to bypass some DNS settings such as bypassing Cloudflare to work directly on your webserver or website. Another thing you can do is give static IP's to devices on your network that never change, such as routers, switches, printers and NAS (network attached storage) devices.
Today more than ever you need to lock down your Website, including the Admin area. If you were to take a look at the access to your Admin Area you would be astonished at the attempts of hackers trying to access and compromise your website. This blog article and video, will show you how to lock this section and even any section of your website. It's simple and free!
I am not sure if you noticed, but there are both 32 bit and 64 bit versions of the Zoom Meetings App. As most know that any 64 bit version of any app will run better and more efficient than a 32 bit version. A 32 bit version of a program can only access 4GB RAM. Therefore if you have a computer with more than 4GB on your system (e.g 8GB, 12GB, 16GB + or more), the 32 bit program will not access it.
At one time most organizations hosted their own mail server and had somewhat control over how they sent email, and usually checked whether they were listed on a RBL (Realtime Blackhole List) or not. Now most organizations have moved their mail servers offsite and now have their email hosted with Google Workspace, Microsoft 365 or some other hosting platform. Your Domain's Reputation is still very important as you are now sending email over an IP shared with other senders. Now that we see greater implementation of IPv6, we are seeing an even greater shift in how email reputation by various mail servers is calculated.