by jwillard | Nov 9, 2014 | Routing and Switching, Security, Tech Tips
XConnect, or L2TPv3 is a great way to extend a layer 2 broadcast network over a WAN connection to another site. It works great when you need to do things like MDNS or AirPlay, or anything else that requires a broadcast style protocol to function. With corporations and...
by Jeremiah Plaskett | Oct 2, 2014 | Collaboration, News, Security
New Vulnerability Affecting Cisco UC Products: A new vulnerability in the Bash shell has been publicly announced. The vulnerability is related to the way in which shell functions are passed though environment variables. The vulnerability may allow an attacker to...
by aharned | Sep 30, 2014 | News, Security
If you haven’t heard, a recent security flaw known as the Bash Bug has been discovered, and threatens to compromise quite a few internet-connected systems. This vulnerability is relatively wide-spread and can affect devices from major web servers to small-scale...
by aharned | May 6, 2014 | News, Security, Storage, Tech Tips
The Macintosh OSX platform is based on Unix, and thus, the POSIX permissions model. With OSX, you can augment these permissions with Access Control Lists (ACLs), which allow for more granularity (very similar to Windows-based permissions), however troubleshooting them...
by jwillard | Apr 28, 2014 | Security
Microsoft announced on April 26th, 2014 a new ZERO DAY vulnerability that allows a computer to give a remote hacker the ability to gain full access to your computer. This affects Internet Explorer 6, Internet Explorer 7, Internet Explorer 8, Internet Explorer 9,...
by jshuman | Apr 9, 2014 | News, Security
A critical vulnerability in OpenSSL cryptographic software library allows attackers to gain access to information that is being protected by SSL/TLS encryption. SSL/TLS is widely utilized throughout the internet by many different applications. This vulnerability has...
Recent Comments