Infographic: Snapcraft for developers

At the end of last year, we shared an infographic highlighting the adoption of snaps by users for their desktop, server or IoT devices. Those snaps wouldn’t be available without the growing number of developers building them behind the scenes. But why have developers, including those from some of the Continue Reading

CentOS News

Releases/updates on Feb 1 – Blog.CentOS.org

Releases/updates on Feb 1 Wednesday , 6, February 2019 Rich Bowen announcement On February 1st (last week) there were a large number of enhancements/updates released by the CentOS community: Errata and Enhancements Advisories We issued the following CEEA (CentOS Errata and Enhancements Advisories): Errata and Security Advisories We issued the Continue Reading

3CX Top Forum Contributors for 2017

3CX is a PBX server in Cloud Server 3CX.Contact us to find out our latest offers! Towards the end of last year we announced that we would be rewarding our top forum contributors who due to their continuous support and contribution have helped numerous forum users and assisted in growing Continue Reading

How to Achieve Automated, Intelligence-Driven Security

Over the last couple of years, cyberattacks have evolved in both scale and effectiveness, affecting organizations across all industries and geographic regions. Successful cyberattacks are a growing industry-wide problem in spite of billions being spent on cybersecurity solutions. Part of the reason is that new techniques- and in fact a Continue Reading

Zimbra’s Wiki – now 17x Faster!

Greetings, Friends. Over the last few months we received reports that our Tech Center was suffering from occasional timeouts or long waiting periods. Not good! We know that our tech articles are critical for your Zimbra deployments and/or configurations, so I have good news for you today. But first, a Continue Reading

Don’t Take It from Us – FortiGate Enterprise Network Firewall Customer Reviews

Last year, Gartner launched a new website and service called Peer Insights. Its goal is to provide organizations looking at adopting new technologies or solutions with access to the collective knowledge and experience of IT professionals that have already evaluated and adopted similar technology. Their posted reviews offer detailed perspectives Continue Reading

Petya’s Master Boot Record Infection

Last week we started our technical analysis on Petya (also called NotPetya) and its so-called “killswitch.” In that blog post we mentioned that Petya looks for a file in the Windows folder that has the same filename (no extension) as itself (for example: C:WindowsPetya). If it exists, it terminates by Continue Reading

Google’s 2017 CTF – The “ASCII Art Client” Challenge

    In our last blog in this series, we discussed FortiGuard Labs’ participation in Google’s second annual Capture The Flag (CTF) competition. In this blogpost, I want to share how I solved another challenge, called“ASCII Art Client”. Challenge Description For this challenge, participants were given two files: a binary Continue Reading

Why Git is Worth the Learning Curve

Over the last decade, distributed version control systems, like Git, have gained popularity and are regarded as the most important development tools by developers. Although the learning curve can pose a challenge, developers told us that Git enhances their ability to work together and ship faster, suggesting that managers have Continue Reading

Zero Patch IoT Environment

Over the last few months or years I have reported vulnerabilities on several IoT devices. None have been patched so far, and I think it is time to discuss the situation openly. One of the issues I have faced several times is the zero-security-culture phenomenon. Some of those IoT companies were typically very small Continue Reading

>