Mind your head!
All code on this website is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
When using physical machines, virtual snapshots are not an option
Using the Swish API with php-curl running in Docker
Whenever a hacker breaks in to a system, there are a few steps they take to keep the access without being caught red handed.
Simple script for monitoring of a web service using curl
High availability requires shared storage of files
Redundant IP-Address assignment simply means that if one node goes down, another takes over the Virtual IP. This can be useful in many different scenarios like firewalling or reverse proxy.
Making your mod_security Apache log readable
Computer Security Enthusiast & Full Stack Developer
UNIX is basically a simple operating system, but you have to be a genius to understand the simplicity.
-Dennis M. Ritchie