BLOG

Why Your Business Should Ditch Knowledge-Based Authentication

At first glance, knowledge-based authentication seems like a pretty good option. You’re protecting an account or service based on information about the user that they know which isn’t necessarily available to the general public. There’s a reason so many online services have their users set security questions when they first create their accounts.

Optimizing Your Dedicated Server’s Performance With Tuned

Your server is more complex than the most fiendishly intricate mechanical device ever devised. It depends on dozens of pieces of software and tens of millions of lines of code, not to mention the hardware, which is mind-bogglingly complicated. All of those pieces work together to serve your web pages and run your shopping carts. As you can imagine, there are hundreds of ways to tweak the way the parts interact, and many of those tweaks impact performance.

Four Web Development Technologies To Learn In 2019

The life of a web developer is one of constant learning, even for those who don’t think their career will die unless they embrace and promote a brand-new, next-big-thing JavaScript framework every three weeks. Technology in the web development space evolves as developers seek new ways to build products. The underlying programming environment, especially JavaScript, is upgraded more quickly that it once was, primarily because it wasn’t fit for purpose in the first place.

Staving Off Burnout As An IT Professional

It’s 3 AM, and you’ve just received an urgent notification on your smartphone. Something is wrong in the server room, and you’re the only one who can fix it. Bleary-eyed, you drag yourself out of bed, grab a coffee, and set to work figuring out what went wrong.

Machine Learning Will Change The Way Developers Work

Developers are problems solvers. Their tools are computers, programming languages, compilers, and text editors. But writing code is a means to end. A developer’s true calling is the invention of creative solutions. We tend to think of development as a machine- and logic-oriented profession, but it is the human trait of creative intelligence for which developers are most valued. In recent years, advances in artificial intelligence research have brought about an alternative means of problem-solving.

Finding Security Vulnerabilities In Web App Dependencies

Could you vouch for the security of every dependency included in the web applications hosted on your servers? Almost certainly not. Modern web applications are the peak of a mountain composed of perhaps hundreds of software packages. It’s beyond the ability of developers to check every line of every package for potential security vulnerabilities. I don’t want to single out any ecosystem for criticism, but this is a particular problem in the JavaScript world, where it’s normal to pull in a vast number of external packages from NPM.

How To Disable Root Logins On Your CentOS Server

A Linux server’s root user has superpowers. A user logged in to the root account can delete any file, including the operating system itself. They can view any data stored on the server. They can install and remove software. In fact, they have complete control over every aspect of the server.