This is part 2 of the series. If you haven’t read part 1 yet, you should. Go here. Welcome back. To recap, we’ve successfully snapped
Category: Technology

No, seriously. How many times has your development team asked you to restore the latest copy of production into dev and your response is “Sure.
Dynamic IP addresses are the bane of a VPN’s existence. This article walks you through how to setup DynamicDNS with your UDM to ensure your WAN IP changing never causes you problems again.
In this article, I show you how to setup configure your UDM for VPN (not Teleport) and configure Windows 10/11 to connect to it.

Today begins the launch of a new series of articles I’m excited to kick off. There are many companies out there that charge exorbitant amounts

As of September 2021, there have already been 1,291 reported website data breaches! In this article, I show you the single easiest way to protect you and your bank account from unexpected charges.

There are 3 elements to a website. The domain (example. www.yourwebsite.com), the hosting (the server that hosts the code for your website) and the code (the actual bits that make up your website). In this post, I will cover each of these.

Let’s talk, for just a moment, about passwords. We all have them. We all use them. But how to do we keep them secure? And

Let’s say you have a website that you host on servers in your company’s datacenter or even hosted in a cloud provider like Azure, Rackspace

We live in a world where everything is digital. 2FA is the single best method you have to prevent your data from being stolen. And it’s not as hard to do as you think.