Amazon Aurora Update – Create Cluster from MySQL Backup

After potential AWS customers see the benefits of moving to the cloud, they often ask about the best way to migrate their applications and their data, including large amounts of structured information stored in relational databases.
Today we are launching an important new feature for Amazon Aurora. If you are already making use of MySQL, either on-premises or on an Amazon EC2 instance, you can now create a snapshot backup of your existing database, upload it to Amazon S3, and use it to create an Amazon Aurora cluster. In conjunction with Amazon Aurora’s existing ability to replicate data from an existing MySQL database, you can easily migrate from MySQL to Amazon Aurora while keeping your application up and running.
This feature can be used to easily and efficiently migrate large (2 TB and more) MySQL databases to Amazon Aurora with minimal performance impact on the source database. Our testing has


Original URL: http://feedproxy.google.com/~r/AmazonWebServicesBlog/~3/J2odSuV8Hno/

Original article

Library Fends Off DDoS Attack

This is a guest post by Bernard A. Barton Jr., chief information officer of the Library of Congress.
On Sunday morning, July 17, the Library became the target of a distributed denial of service (DDoS) network attack that resulted in the disruption of Library services and websites, including Congress.gov, the U.S. Copyright Office, the BARD service from the National Library Service for the Blind and Physically Handicapped, our many databases, and both incoming and outgoing email.
I’m pleased to report that our team of Library IT professionals and contract partners have returned our networked services to normal functionality. We did this while maintaining the security of the Library’s network.
This was a massive and sophisticated DNS assault, employing multiple forms of attack, adapting and changing on the fly. We’ve turned over key evidence to the appropriate authorities who will investigate and hopefully bring the instigators of this assault to justice.
We’re satisfied that we’ve


Original URL: http://blogs.loc.gov/loc/2016/07/library-fends-off-ddos-attack/

Original article

Microsoft is killing Skype for Windows Phone — a final slap in its fans’ faces

Windows Phone was a terrible experiment that never got off the ground. Microsoft’s mobile operating system was never popular with developers, nor did many consumers care about it. With that said, some of the company’s most loyal fans did embrace it, however. Not to mention, due to low prices, a small number of unknowing budget-hunters bought the much maligned phones too. Fast forward to today, and Microsoft has moved on to Windows 10 Mobile. Sadly, its newest mobile push is not doing well either, but I digress. As a final slap in the face to users that own Windows Phones that… [Continue Reading]


Original URL: http://feeds.betanews.com/~r/bn/~3/x_HETEN0hTs/

Original article

Mitigating the HTTPoxy Vulnerability with NGINX

On July 18th, a vulnerability named ‘HTTPoxy’ was announced, affecting some server‑side web applications that run in CGI or CGI‑like environments, such as some FastCGI configurations. Languages known to be affected so far include PHP, Python, and Go.
The vulnerability was mentioned on the NGINX mailing list in July, 2013, by Jonathan Matthews. This month, it was found in the wild.
A number of CVEs have been assigned, covering specific languages and CGI implementations:

There is a new website describing the vulnerability, a CERT vulnerability note, and a description of the discovery of the vulnerability. There is additional information on the personal website of Dominic Scheirlinck, an open source web developer at Vend.
This post describes the vulnerability and explains how to use NGINX or NGINX Plus to defeat attempts to exploit it on your servers.
The vulnerability exists because of a namespace clash. A CGI or FastCGI‑like interface sets environment variables based on HTTP


Original URL: http://feedproxy.google.com/~r/feedsapi/BwPx/~3/0fSO63XCs_o/

Original article

Review: 4 mini-PCs give you full power in a very small package

There is a new generation of mini-PCs out there — small, inconspicuous but powerful. They offer a number of advantages for businesses over laptops or more traditional desktop systems.
First, they can be placed where most traditional desktops and laptops won’t fit, and can be set up in creative ways, such as in a drawer, on the underside of a desk or on the back of a display. As a result, they are perfect for places like call centers or school computer labs, where you want to maximize space and keep the computers out of sight.
They also don’t use a lot of electricity, so they are excellent for environments where electrical current can be an issue, such as a construction site trailer. In fact, one of the units we review, the InFocus Kangaroo Pro, is so small and power-efficient that it can run for more than an hour on battery power.To


Original URL: http://www.computerworld.com/article/3096929/windows-pcs/review-4-mini-pcs-give-you-full-power-in-a-very-small-package.html#tk.rss_all

Original article

HTTPOXY Vulnerability: How to protect and test your web server

This tutorial will show you how to protect your web server from HTTPOXY. It contains sections for the most used Linux Distributions CentOS + RHEL, Debian, and Ubuntu. The HTTPOXY vulnerability which has been found recently is a vulnerability that affects applications that run in cgi or cgi-like environments. This means that the issue affects almost all web servers including Apache and Nginx and also most PHP applications. Even the mod_php mode on apache is affected.


Original URL: https://www.howtoforge.com/tutorial/httpoxy-protect-your-server/

Original article

Proudly powered by WordPress | Theme: Baskerville 2 by Anders Noren.

Up ↑

%d bloggers like this: