Search:

Type: Posts; User: Brian Altenhofel; Keyword(s):

Search: Search took 0.10 seconds.

  1. You could have everything under version control...

    You could have everything under version control and have a script that checks for changes and sends a notification (as well as checks back out the known good code). Fairly trivial - just use Git, a...
  2. Don't run CentOS/RedHat (except for Zenoss...

    Don't run CentOS/RedHat (except for Zenoss because *It just works*). I'm a Debian guy.

    But it doesn't take long at all. Anytime I push an update to my Puppet configs, Jenkins deploys ~15 cloud...
  3. That's one of the reasons that I don't use shared...

    That's one of the reasons that I don't use shared hosts. Too many issues with privilege escalation or bypass that results in every site on that same server being compromised even if there wasn't a...
  4. Yep, we see thousands of port scans and brute...

    Yep, we see thousands of port scans and brute force attempts on our edge servers. We have various tools in place for monitoring and response at each tier, both for security and performance. Right...
  5. A lot of those proxies (like known Tor exit...

    A lot of those proxies (like known Tor exit nodes) end up on RBLs really fast. I've got one site that somehow got targeted for spam (services like Mollom and Recaptcha caught 99+% of it, but still...
Results 1 to 5 of 5