The End of Cross-Site Scripting: WordPress 5.1.1 Released

Older versions of WordPress make all posts vulnerable to cross-site scripting. But the cross-site scripting vulnerability in WordPress is a thing of the past now since the release of v5.1.1. The WordPress team have introduced several fixes in this new version. But first – What does a cross-site scripting vulnerability Continue Reading

Group Replication – Consistent Reads Deep Dive

On previous posts about Group Replication consistency we: introduced consistency levels; explained how to configure the primary failover consistency; presented how to configure transaction consistency levels to achieve the consistency required by your applications. In blog 3. we presented the consistency levels: EVENTUAL, BEFORE, AFTER and BEFORE_AND_AFTER; their scopes: SESSION, Continue Reading

Private Git Repositories: Part 5 – Hosting Repositories on Bitbucket

In this series of blog posts on using a private Git repository with OpenShift, we have covered how to use a repository hosted on both GitHub and GitLab. We will now close out this series of posts by looking at how to use a private Git repository hosted on Bitbucket. Continue Reading

Private Git Repositories: Part 4 – Hosting Repositories on GitLab

All the discussion around using private Git repositories so far in this series of blog posts has used GitHub as the hosting service. In this post we will look at using private Git repositories hosted on GitLab. From the perspective of how things are done in OpenShift, there is no Continue Reading

Private Git Repositories: Part 3 – Personal Access Tokens

In this series of posts, we have been delving into the use of private Git repositories with OpenShift. As was covered in previous posts, the preferred mechanism for accessing a private Git repository is to use an SSH connection and a repository SSH key. A repository SSH key, however, can Continue Reading

Boost your e-commerce traffic with content

Blogs, social networks posts, newsletters—a handful of ways exist to reach your target audience and attract them to your online store.To succeed, you’ll need to come up with some relevant and original content! Start by taking an interest in your target group. Consider them above all to be a community Continue Reading

The Future of Healthcare Data Threats and Security

Our recent blog posts have focused on malware, and more specifically ransomware, as a primary threat vector currently plaguing healthcare.  This week, we turn our spotlight on users and the challenges of coping with behavioral threats.  Scott Whyte, senior vice president of growth and innovation at ClearDATA, says that tactics Continue Reading

Did You Know: The Zimbra Desktop UX

In my recent Zimbra Desktop posts, I have failed to mention the awesome Desktop user interface or user experience (UX). Do you currently use the Zimbra Web Client? In other words, do you open a browser to access your Zimbra account? If yes, than Zimbra Desktop will be very familiar Continue Reading

The Importance of Using Protection | The Ins and Outs of Firewalls

We do a lot of posts on server protection because honestly — it’s pretty important. This time around we wanted to highlight and breakdown one of the most common tools used to protect your machine: the firewall. In this tips and tricks, we’ll go over what is a firewall, how Continue Reading

>