General

Server uptime

When you are owning a server, a virtual private server or a dedicated server, you sure would want to know the availability of the server on the internet and how long it has been running.

One of the command to check this is called uptime. This command only works on unix or linux operating system.

To display the system uptime, invoke the command without any options ::

type uptime

The output will show something like this :

22:20:33 up 620 days, 22:37, 1 user, load average: 0.03, 0.10, 0.10

22:20:33 is the current system time.
up 620 days, 22:37 is the length of time the system has been up.
1 user is the number of logged in users.
load average: 0.03, 0.10, 0.10 are system load averages for the past 1, 5, and 15 minutes.

The load average on Linux can be a little confusing. Unlike other operating systems that shows CPU load averages, Linux is showing system load averages.

Continue reading…

Email spam on Office 365

If your company has moved to Office 365 as a hosted email solution, your email is being hosted in a Microsoft Data Centre and most likely being filtered using Microsofts Exchange Online Protection (EOP). Although the Office 365 spam filter offers a
reasonable level of security, some businesses find it basic and lacking when it comes highly-sophisticated cyber threats especially advanced and persistent spear phishing attacks.

With this approach, security is not dependent on any single layer, especially in the event of an attack. Office 365 offers 2 levels of email security, “Exchange Online Protection” and “Advanced Threat Protection” for a protection level in the low-middle of the market, according to an SE Labs study, “Email-hosted protection” published in August 2017. As email security experts with over 20 years’ experience, we know new malware can penetrate the usual email filtering mechanisms. It has long been the case that older email protection technologies, like analysis reputation and fingerprinting, are no longer effective against the evolution of these threats.

More details at https://www.titanhq.com/protecting-office365-from-attack

Is someone spying on you?

Everyday personal data is stolen in criminal cyber attacks. A large part of the stolen information is subsequently made public on Internet databases, where it serves as the starting point for other illegal activities.

With the HPI Identity Leak Checker, it is possible to check whether your email address, along with other personal data (e.g. telephone number, date of birth or address), has been made public on the Internet where it can be misused for malicious purposes.

Check it here : https://sec.hpi.de/ilc/search?