2018: The year cloud hosting goes mainstream

Web hosting has remained virtually unchanged since the first days of the Internet in 1991: This despite the fact that conventional hosting model has many weaknesses.

Conventional Hosting is Broken

Pragmatists will say we don’t need cloud hosting, quoting the adage, ‘If it isn’t broken, don’t fix it,’ but this doesn’t apply because traditional hosting models have always had problems.

Continue reading…

Server Monitoring Tools

Your web and mobile applications are expected run flawlessly round the clock. To make sure they run as expected you need server monitoring tools to watch your servers and applications. Also, you need people and process in place to address alerts from these tools any time of the day or week.

Open source tools are sometimes too basic to monitor a system on which a business relies. On the other hand, they can be useful toolkits that a development team can use to build exactly the type of monitoring tool they need. Of course, that team would have to have one or more members willing to manage and maintain the monitoring system they build.

Continue reading…

IBM’s New Data Transfer Device Overcomes Cloud Migration Hurdles

One of the barriers for enterprises storing data in the cloud is data migration, a process that has traditionally been slow and costly, hindered by network limitations. IBM wants to remove this barrier for its customers with a new cloud migration solution designed for moving massive amounts of data to the cloud.

IBM Cloud Mass Data Migration is a shippable storage device, which offers 120 TB and uses AES 256-bit encryption. The device also uses RAID-6 to ensure data integrity and is shock-proof. The device is flat-rate and includes overnight round-trip shipping.

Continue reading…

GhostHook: A Kernel-Level Threat in 64-Bit Windows Systems

GhostHook is a new attack technique which allows hackers to bypass kernel protections of Windows 10 PatchGuard and plant rootkits within systems. PatchGuard is a software tool that has been designed to forbid the kernel of 64-bit versions of Windows operating systems from being patched, preventing attackers from executing malicious code or running rootkits at the kernel level.

According to the researchers at CyberArk, GhostHook is neither an elevation nor an exploitation technique but a post-exploitation attack where the attacker has control over the compromised system. It provides the hacker with the ability to hook almost any piece of code running on the system.

Continue reading…