We can never expect a dull moment this year. From the Microsoft buying GitHub to more data breaches, check out some good content in our round up! If you enjoy this collection of the web’s top articles, feel free to follow us over on Facebook, Twitter, and Google+ for the same great content the rest of the year.
At first glance, knowledge-based authentication seems like a pretty good option. You’re protecting an account or service based on information about the user that they know which isn’t necessarily available to the general public. There’s a reason so many online services have their users set security questions when they first create their accounts.
Your server is more complex than the most fiendishly intricate mechanical device ever devised. It depends on dozens of pieces of software and tens of millions of lines of code, not to mention the hardware, which is mind-bogglingly complicated. All of those pieces work together to serve your web pages and run your shopping carts. As you can imagine, there are hundreds of ways to tweak the way the parts interact, and many of those tweaks impact performance.
It’s 3 AM, and you’ve just received an urgent notification on your smartphone. Something is wrong in the server room, and you’re the only one who can fix it. Bleary-eyed, you drag yourself out of bed, grab a coffee, and set to work figuring out what went wrong.
Developers are problems solvers. Their tools are computers, programming languages, compilers, and text editors. But writing code is a means to end. A developer’s true calling is the invention of creative solutions. We tend to think of development as a machine- and logic-oriented profession, but it is the human trait of creative intelligence for which developers are most valued. In recent years, advances in artificial intelligence research have brought about an alternative means of problem-solving.
Much has already been written about the importance of creating a culture of cybersecurity. About how your business’s executive team plays a huge role in whether or not your organization is security-conscious. About why security is everyone’s job – not just something for the IT department.
A Linux server’s root user has superpowers. A user logged in to the root account can delete any file, including the operating system itself. They can view any data stored on the server. They can install and remove software. In fact, they have complete control over every aspect of the server.
Every once in a while, you may want to give an outside developer, designer, or agency access to your dedicated server or virtual private server. Perhaps you hired them to do some development work on your eCommerce store or to modify your WordPress site’s theme. As part of their job, they may need to upload files or edit code.