What happens if you setup a badly password protected server on the public internet without telling no one? How much time would it take before a botnet would try to hijack it?
In the recent past, there have been numerous debates on the privacy of personal data in devices like smartphones and laptops as well as on online sites like Facebook and Google.
One of the new features being proposed in C# 8.0 is to introduce Records. They are essentially a very lightweight class that is a collection of fields.
One of the duties of the best man is to assist the groom (and bride) in the preparations. It occured to me that Agile might just be the best way to plan a Wedding!
One of the new features being proposed in C# 8.0 is to add support for virtual extension methods (methods in interfaces with concrete implementations)
One of the features being discussed for introduction in C# 8.0 is Nullable Reference Types. A proficient C# Developer might say "What?! Aren't all reference types nullable?"
Networks that run with users as local administrators have no way to enforce policies on their organization's computers. In this post, I show how and why.
What an honor to meet the Silicon Valley icon who has shaped the computing industry in the early days with his design of Apple's first line of products the Apple I and II, and his influence on the Mac
With BYOD, companies are more than ever keen on protecting their data. MDM tools, like Google Apps, do more than that; they invade your privacy.
A CPU predicts you will walk into a bar, you do not. Your credit card has been stolen. The drinks are 30% more expensive. (Oh, and the bartender was insider trading)
What went wrong with NASA's Mars Climate Orbiter, $327.6 million probe? What can we learn from the mistake?
It is a common misconception that idempotent REST requests MUST return the same response for repeated requests. Why is it wrong?
An open-source calendar with a collection IT Professional Dates. Contribute or Use.
Brotli is a relatively new general-purpose lossless compression algorithm. Microsoft has officially endorsed Brotli in .NET Standard and we see how to use it.
Byzantine Fault Tolerance is a characteristic of a system that tolerates failures known as the Byzantine Generals' Problem; for which there is an unsolvability proof.
Open source slides (licensed under the CC BY-SA 4.0 License) for my Linux Knowledge Sharing session which explores Linux History and some basic commands.
A Blockchain is an immutable, decentralized, secure and distributed database that maintains a continuously growing list of chronological records called blocks.
Serverless is a style of architecture where we rely running our own functions over abstracted Software and Hardware Servers
As part of ASP.NET Core 1.1, Microsoft introduced the Response Compression Middleware. Here, you can see how to apply this to your ASP.NET Core Web Apps.
Leap Seconds. A new one is being injected at the end of 2016. Why should you care? Is your infrastructure and software prepared for the issues it brings with it?
The ISS has equipment that transmits on Voice and Pictures on Amateur Radio Bands and it is possible to hear the Astronauts speaking! How can you hear them?
The Competing Consumer Pattern enables a system to process multiple messages concurrently to optimize throughput, to improve scalability and availability.
By introducing an Asynchronous Queue between a task and a service, you will be allowing the service to handle the messages at its own pace
Being Network Engineers, most of you are able to talk for hours about Layers 2 to 7, but very little of us know what actually happens at Layer 1
Public CDNs are awesome; they are fast and free, but it means that third parties have control of stuff that run on your site. What if the CDN is compromised?
Have you ever wondered why your nameserver does not allow you to put a CNAME Record at the zone apex?
The Battery Status API provides information about the system's battery to the browser. How can this be used for advertising?
What is HSTS? How does it protect your web host from SSL Stripping Man In The Middle attacks? How can you implement it?
DNSSEC is a suite of specifications for securing DNS. How do you enable your Windows DNS Server to Validate DNSSEC?
DNS is a critical infrastructure component of the Internet. How did it originate? How does it work? Who controls it? Is it secure?
It is becoming increasingly important, especially on mobile devices, to have your apps support IPv6. What does it take to get your app ready?
There are no longer any IPv4 addresses available for allocation from IANA. This means that adoption of IPv6 is now of paramount importance.
How can Alice and Bob agree on a secret, without having any prior knowledge of each other, over the Internet and with Eve listening in on the conversation?
BGP is one of the core protocols that drive the Internet, yet few people know what it is, yet alone how it works. In this post we scratch the surface on what BGP is and how it works.
It is increasingly common to see Redis being used in modern applications. Learn how to monitor a Redis cluster or standalone instance in PRTG.
Applications that rely heavily on a data-store usually can benefit greatly from using the Cache-Aside Pattern. How does it work?
A series on some common and modern Design Patterns that are useful in today's horizontally scalable (such as cloud-hosted) applications.
Windows Server 2016 Datacenter Edition introduces Storage Spaces Direct (S2D). How does Caching and Storage Tiering differ from Storage Spaces?
Learn how to use PRTG to monitor and alert on RabbitMQ status using the RabbitMQ Management Plugin REST API
Do you realize that BIOS has been around for more than 30 years? This 3 decade old technology is finally being replaced by UEFI. But what is UEFI and how does it work?
Petya is a new variant of ransomware, first seen in March 2016 that encrypts your entire hard drive. Learn how to reverse it and get your data back.
Encrypting Ransomware is one of the biggest threats in 2016, both for personal computers, your corporate IT and enterprise infrastructure. How can you mitigate and minimize your attack vectors?
Visual Studio "15" Preview is now released and with it comes a new set of features for C# 7
It's been a decade since 64-bit processors have started popping up in the consumer Windows environments, but do you know how 64-bit affects your application?
March 31st is World Backup Day. Even though, everyday should be World Backup day, today we discuss some important backing up techniques and tips to hopefully raise some awareness
Most systems designed are heavily dependent on accurate time. In this blog I discuss some best practices on how to handle time zones and daylight savings in your infrastructure and applications
Have you ever tried to await a task inside a lock() block? In this post we discover how to replace a lock with a Mutex.
It's not the first time that Google has exhibited the insides of their data centers, but this new video offers a virtually immersive look into how their Oregon Data Center works.
Do you use PRTG and Slack in your corporate environment? You have a match made in heaven. Learn how to make PRTG post to Slack using HTTP Webhooks
What is Hyper-Convergence and what does it mean for our data-center and infrastructure?
Hardware and Software tools you need for a better developer lifestyle as well as Blogs and Books to read and follow to enhance your knowledge of this continuously changing environment