September, 20 1pm PT
Live StarWind presentation
Meet industry-first
software-defined NVMe
over Fabrics
Target and Initiator
for Microsoft Hyper-V and
VMware vSphere
Posted by Gary Williams on May 22, 2018
Install Gitlab, HTTPS and the container registry

Many of us view Gitlab as something that only developers may use. Indeed, these guys love it, but are they the only ones who may find it handy? That’s time to dispel that myth! Gitlab is more than the cool repository for scripts of any size and shape. It is a feature-rich solution, so that won’t be fair to leave that thing on the table.

Learn More

Posted by Gary Williams on March 15, 2018
Demystifying HTTPS

This blog is going to be all about the secure certificate side of things, by setting these headers you reduce the chances of certain types of probes and attacks from being successful. The server itself and whatever applications you are running on it still need to be upgraded and configured to reduce the chances of someone gaining unauthorised access to your systems.

Learn More

Posted by Mikhail Rodionov on April 6, 2017
Configuring SharePoint 2016 App Catalog

In my previous blog post, I covered SharePoint 2016 installation process, my next logical step after that was to configure SharePoint app catalog so that I can add K2 for SharePoint app and as I covered this process earlier on my personal blog, I expected this to be a small task. Indeed, I had created it following steps from my old blog post in just minutes, but, alas, I run into loads of warnings while running K2 for SharePoint AppDeployment.exe. I sorted most of them but after seeing extra warnings telling me that additional configuration is required just because I’m using HTTP instead of HTTPS I decided that it is better to re-create my app catalog using HTTPS.

Learn More

Posted by Oksana Zybinskaya on March 7, 2016
HTTPS sites are threatened by a new low-cost decipher attack

TLS
A new low-cost attack that decrypts sensitive communications in neglectable time has been discovered recently. The attack works against TLS-protected communications using RSA cryptosystem which expose the key through SSLv2, which was retired two decades ago due to vulnerabilities, but still may be supported by some service due to legacy compatibility reasons or misconfigured TLS implementations.

Learn More