Over the past few years, several large-scale changes have been introduced, directly affecting how information now circulates, within and without firms. This phenomenon has been greatly accelerated by the overhauling of information systems and the intensive use of NICTs (blogs, forums, collaborative websites, social networks and media). These changes increasingly call into question how firms …
Blog
Hackers, crackers, pirates… Les médias et le grand public se sont malheureusement emparés de ces mots depuis plus de deux décennies. Les mots, comme la parole, un clavier ou un couteau sont des outils puissants qui peuvent être utilisés aussi bien à des fins malveillantes que pour « faire le bien ». De nos jours, avec le …
Hackers, crackers, pirates: The media and the general public have unfortunately seized on these terms for a good couple of decades. Words, like a speech, keyboards and knives are all powerful tools for both good and evil ends. Nowadays, with the development and acceleration of means of communication, the goalposts in the information game have …
>Hello World, Parfois il peut être utile de pouvoir vérifier si un domaine est correctement synchronisé sur vos serveurs DNS maître et esclave. Le moyen le plus simple pour y parvenir et de comparer les numéros de série de la zone entre les 2 serveurs dns. On peut utiliser également cette méthode pouvoir voir où …
>Hello World, Sometime it can be useful to check if a domain is correctly synchronized on your master and slave dns servers. The easiest way to do this, is to simply compare the serial number between your 2 dns servers. That also can be useful to check about dns propagation in the internet. For doing …

>Hello World ;) If you use or manage OVH dedicated servers, you probably know this excellent and cheap service : Load Balancing (LBIP or IPLB in French). This is an IP address carried directly by the OVH network which spreads traffic load across the IPs of your OVH dedicated servers / public cloud / private …
When you need to purge binary logs on a MySQL server, you just need to connect to your server and use the PURGE BINARY LOGS command like this : For example : Will purge all the binary logs before the date. Other method is to purge log file on « name » attribute of the log file. …
Sometimes you discovering a vulnerability when you don’t search for and sometimes finally like this, it’s simply a false alert. More than 70 percents of vulnerabilities I’ve found in my life have no rapport with a security research, but simply due to chance, when doing administrator tasks for example. This day, I decide for …
Hi all, after showing you how to simply check load average or memory usage on linux, today i’ll simply show you how to check disk space and take action if a threshold is reached. We’ll simply use df, grep, awk, cut and if/then to do this : Just put it in your crontab and you’ll …
In your admin work it can be useful to check free memory and take action on threshold. The most tools don’t show you a realistic state of your memory. For example if you launch « top » command on a server, you’ll obtain an information like this : If you use the « free » command, you’ll obtain the …
WordPress « Pingback » DDoS attacks can generate a lot of requests to your website that can affect performances and availability.  You can recognize easily this attacks : you just need to do a tail -f  on your logs and you’ll probably see thousand of request that have a User-Agent « WordPress xxxx » on it. I don’t think …
When you work for a MSP, a hosting company or a cloud operator, sometimes you need to delete a lot of dns zone in one time. If you need to delete 1500 zones with your hand and you keyboard, you ‘ll need week to do the job. So let me show you how you can …