Featured

Drupal Security threats and how we respond at NEWMEDIA!

Showing "All" Blogs

Consistency is the key to successful engineering teams.
Two-factor authentication is an powerful way to strengthen your systems authentication. Yubikey is one technology that can be used to integrate two-...
Incorrect configuration of your LDAP client authentication can make it so you cannot log in to a system. By abstracting your client authentication...
Logwatch is a powerful tool that can provide you with a daily summary of activity on your system.
Ubuntu and CentOS use postfix as their defacto MTA. NMBbase leverages the community cookbook to manage the extensive functionality that it provides.
Recently we turned on a internet connected server and within 6 hours had well over 1000 failed ssh login attempts. Defining a solid fail2ban...
Having a solid iptables firewall configuration can go a long way in securing your systems.
A good sudo configuration provides accountability and visability by allowing users to only execute comands that they need to run with elevated...
OpenSSH is a requirement for managing any Linux system as it provides a encrypted conduit with serious amount of functionaility.
Setting up NMDBase for local testing.
QA is the purity of your site. Just like Gale Boetticher could only achieve 96% purity of the meth, your ability to knock out the QA and wrap up your...
In the previous post we setup a mixin that lets us create component layout styles where we can define how many components per row we want and how...
Rems (Relative ems) are an awesome way of sizing text without using pixels. But there is an issue with rendering them in Chrome, which makes text...
A logo for a company is important, but it is not your site!

Pages

  • 1
  • Showing 1-15 of 84