Author: Liku Zelleke
It is quite often said that the employees within their organizations pose the gravest threat to a business’s cybersecurity and hence, are their weakest links when it comes to …
When you disable network access to Windows Registry, you make it harder for remote attacks to compromise your data and your computer. It is a way of protecting …
Deploying a secure Azure FTP server in your network helps you secure the storage, sharing, and management of your mission-critical files. When integrating this service with Files.com, you further …
Learning how to decrypt SSL with Wireshark is important if you want to keep an eye on the data that is passing back and forth between the clients, servers, …
If you want to know how to create an SFTP server using Cygwin, you just have to read on. This data storage solution offers one of the best and …
Systems administrators and power users with even a few years of experience will have heard of Grafana. But, don’t worry if you haven’t – in this post, we will …
Getting started with Kibana is easier than you think. Once you have chosen to use it to make sense of your logs, it is a straightforward process to implement …
Graphite can be considered to be one of the best data center monitoring tools on the market today – and it is free. In this post, we will have …
Datadog and Graphite are arguably two of the most popular IT-monitoring solutions on the market today. They are used by enterprises to keep an eye on the overall health …
Graylog and Datadog are the two popular log monitoring solutions or LMS tools used by many enterprises to monitor their infrastructure. These tools delve into logs that are created …