Category Archives: Linux

Q&A Monday: How often should I update my Linux Servers?

Question: I have recently become responsible for more servers at my current job, some of these servers are of the  RedHat and Debian flavor of linux, and I was wondering what is the recommended period of time between checking for updates on these servers? Catina P. Martin Mira Loma, CA   Answer: To be honest, it all depends on how…

Read More

Alternatives to Outlook

    I’ve been asked about this more times than I can remember, so I figured I’d just do an article about it….What are some alternatives to Microsoft Outlook.  To fully disclose I still cling on to my Outlook for my windows machine, but I do use other software for my linux machines.  So I’ve…

Read More

Effectively Erasing Files

Thinking about getting rid of a computer can actually be a lot more complicated that initially thought.  Many people remember to get their files off and delete any important information from the drive and think that’s the end of it.  It’s not just individuals, companies can also fall into this trap.  Just selecting delete does…

Read More

Top 5: Most overlooked configuration items

No matter how prepared and how well documented the network is, sometimes techs forget some basic configurations sometimes.  It’s never intentional, but sometimes there are small configurations that we just need to double check.  Below is a list of some things that I’ve seen (and have) forgotten to double check when doing a project. Subnets…

Read More

Adobe Flash Update

Adobe has finally dealt with part of the security issues that it addressed earlier in the week. Adobe has finally updated their Flash Player with the release of version 10.1 (download here).  It is recommended that as soon as possible you update all your computer and servers. Note that this update does not fix the…

Read More

Google Release New Chrome 5.0.375.70

Google has released Chrome 5.0.375.70 for Linux, Mac, and Windows to address multiple vulnerabilities. These vulnerabilities may allow an attacker to execute arbitrary code, conduct cross-site scripting attacks, bypass security restrictions, or obtain sensitive information. I shouldn’t have to tell you, but I will anyway, if you are using an older version of the Chrome…

Read More