Hackers Use Software Cracks and BitTorrent Client to Steal Cryptocurrency
Apr15

Hackers Use Software Cracks and BitTorrent Client to Steal Cryptocurrency

It’s no secret that scammers are constantly trying to trick people into downloading malicious content from pirate sites. These files are generally easy to spot for seasoned pirates and they are often swiftly removed from well-moderated sites. However, for casual downloaders, malware can be a serious problem. Novices are often directed to dubious portals where these threats are harder to avoid. That can lead to disastrous consequences....

Read More
Philippines Government & ISPs Reach Agreement to Rapidly Block Pirate Sites
Apr15

Philippines Government & ISPs Reach Agreement to Rapidly Block Pirate Sites

Alongside various initiatives to discourage Internet users from visiting pirate sites, including improved legitimate offerings, governments, rights holders and service providers are pressing ahead with their site blocking plans. Broadly speaking, site blocking takes place under two regimes – court-ordered injunctions and voluntary arrangements between stakeholders. The former can prove effective but there are considerable costs...

Read More
5 reasons sysadmins love systemd
Apr15

5 reasons sysadmins love systemd

As systems administrators know, there’s a lot happening on modern computers. Applications run in the background, automated events wait to be triggered at a certain time, log files are written, status reports are delivered. Traditionally, these disparate processes have been managed and monitored with a collection of Unix tools to great effect and with great efficiency. However, modern computers are diverse, with local services...

Read More
A beginner’s guide to load balancing
Apr15

A beginner’s guide to load balancing

When the personal computer was young, a household was likely to have one (or fewer) computers in it. Children played games on it during the day, and parents did accounting or programming or roamed through a BBS in the evening. Imagine a one-computer household today, though, and you can predict the conflict it would create. Everyone would want to use the computer at the same time, and there wouldn’t be enough keyboard and mouse...

Read More
Resolve systemd-resolved name-service failures with Ansible
Apr15

Resolve systemd-resolved name-service failures with Ansible

Most people tend to take name services for granted. They are necessary to convert human-readable names, such as www.example.com, into IP addresses, like 93.184.216.34. It is easier for humans to recognize and remember names than IP addresses, and name services allow us to use names, and they also convert them to IP addresses for us. read more Powered by...

Read More