This is part 2 of the series. If you haven’t read part 1 yet, you should. Go here. Welcome back. To recap, we’ve successfully snapped
Author: satola

No, seriously. How many times has your development team asked you to restore the latest copy of production into dev and your response is “Sure.
Dynamic IP addresses are the bane of a VPN’s existence. This article walks you through how to setup DynamicDNS with your UDM to ensure your WAN IP changing never causes you problems again.
In this article, I show you how to setup configure your UDM for VPN (not Teleport) and configure Windows 10/11 to connect to it.

At some point, a local pizza shop that I order from often had a data breach and my saved credit card number was stolen. I

Today begins the launch of a new series of articles I’m excited to kick off. There are many companies out there that charge exorbitant amounts

As of September 2021, there have already been 1,291 reported website data breaches! In this article, I show you the single easiest way to protect you and your bank account from unexpected charges.

There are 3 elements to a website. The domain (example. www.yourwebsite.com), the hosting (the server that hosts the code for your website) and the code (the actual bits that make up your website). In this post, I will cover each of these.

Let’s talk, for just a moment, about passwords. We all have them. We all use them. But how to do we keep them secure? And

Let’s say you have a website that you host on servers in your company’s datacenter or even hosted in a cloud provider like Azure, Rackspace