Software-defined storage pool
Daniel Mecsei

Software-defined storage pool

At Virtualization Day 2017 in Budapest, Hungary, we saw pretty good presentations about a different type of virtualizations and architecture concepts. In forenoon, Gergely Rab from Dell have shown us some very useful tools and solutions for software-defined storage architecture. One of these products is ScaleIO, which utilizes standard x86 servers and Ethernet network. In a standard lifecycle, you firstly plan and deploy your new array, then expand and optimize the storage. When the array comes to the end of its life, the process begins again, and you’ll also have to migrate your data...
Read more
Hot new feature - Goodbye CAPTCHA! Hello Browser Integrity Check!
Anita Batari

Hot new feature - Goodbye CAPTCHA! Hello Browser Integrity Check!

How would you imagine a world where annoying CAPTCHAs are not the first line when it comes to identification of botnets and human visitors? Here at BitNinja we thought big and made it come true. Let us show you a security solution where the visitors with suspicious incidents in their past don't have to type anything, moreover, they don't have to click anywhere either. It sounds too good to be true, isn't it? Some of our users (you know, big players who) run into this issue when their end-users - who would like to surf on sites - were afraid of filling CAPTCHAs. We couldn...
Read more
Vulnerabilities of Small Office/Home Office routers
Ferenc Barta

Vulnerabilities of Small Office/Home Office routers

I'm quite sure that you have one of the small office/home office (SOHO) devices at home to share the Internet access for your computers, smartphones and IoT gadgets. These devices are really great, as they are capable of routing and address translation, they often have a built-in switch, an access point and a user-friendly web-based management interface.  In summary, they meet the requirements of home networking for an affordable price. Unfortunately, researchers and hackers often find serious vulnerabilities in these consumer-grade devices. Recently we have contacted several I...
Read more
High Availability
Daniel Mecsei

High Availability

In computer science, the term of availability is used to describe the period of time when a service is available. High availability is a quality of a system that assures high-level performance for a given period of time. The main goal of high availability is to eliminate the Single Point of Failures (SPoF) in your infrastructure. To eliminate SPoF, each layer of your stack must be prepared for redundancy. Be aware, redundancy alone cannot guarantee high availability. A mechanism must detect the failures and take action when one of your components of the stack becomes unavailable....
Read more
IP spoofing: don’t let hackers deceive you
Nikolett Hegedüs

IP spoofing: don’t let hackers deceive you

IP address spoofing is a technique used by hackers to disguise their IP address as another IP and gain access to sensitive information or access private services on authorized networks. In some special cases, they can create IP packets that contain a false source IP address and this way hide their original address or impersonate another computing system.This is possible when they have access to the router for the local network. The Internet Protocol states that all IP packets must have a header section. This section contains the IP address of the packet’s sender - and other information too,...
Read more
Upcoming Developments
Eniko Toth

Upcoming Developments

We have some questions for you: 1. Do you want a server security software which is so easy-to-use that you have almost nothing to do with it? 2. Would you like to understand better the operations of BitNinja? 3. Are you dreaming about a software which is always up-to-date and gets improved day by day? We know that all your answers are YES and we keep your wishes in our mind every day. You are an inspiration to us so we worked very hard for you in the last quarter and it had many results: New product tour video First Webinar New server view on the Dashboard Malw...
Read more
The benefits of Free Licence
Eniko Toth

The benefits of Free Licence

What kind of protection does the Free Version provide? What features are available on the Dashboard if I only have free licences? These are frequently asked questions and now, we would like to summarize the answers to those users who only use the Free Version on their servers. This overview can also help if you have some doubts regarding the BitNinja or it can assist even those clients of ours, who would like to learn a bit more about the Dashboard. Let’s begin, shall we? What’s the difference between the Pro and the Free Versions? The Free Version provides only basic protecti...
Read more
The most common CMS attack types
Daniel Mecsei

The most common CMS attack types

Nowadays, the Internet plays a huge part in our lives. It gets bigger and bigger every day, now it has more than one billion websites. Most of these sites are built with CMS which stands for Content Management System. It is a tool that provides an easy-to-use method for users without any programming skills in creating websites. The most common CMSs are written in PHP because most shared-hosting providers only provide this way to share/operate your website with the community. According to the statistics, WordPress has the largest market share with 52%, followed by Joomla with only 6%. The...
Read more
Cloudifying your legacy applications
Nikolett Hegedüs

Cloudifying your legacy applications

Nikolett Hegedüs
In this article we will be dealing with OpenShift and Kubernetes technology. You can find some explanations about the terms used at the end of the article. If you want to take the neccessary steps to upgrade your own application, the first thing to do will be turning your pile of code into a container image.   The first step: containerization The Source-to-Image (s2i) method: Source-to-Image is an OpenShift tool for building reproducible Docker images by injecting source code into a Docker image. The new image will include the base (builder) image and the injec...
Read more
Configure your Railgun server to see proper logs
Nikoletta Szabo

Configure your Railgun server to see proper logs

Nikoletta Szabo
Many of our customers who use Cloudflare have recently notified us that they are not able to see the proper visitor IPs in the logs only the railgun server IPs. It is caused due to the fact that the requests are not directly coming from Cloudflare, so mod_cloudflare will not restore the IP’s of the visitor. That is why we would like to ask you to configure the mod_cloudflare. What is a Railgun server? How do I fix this? Open your Apache configuration ( if you do not know where to find it, ask your hosting provider for assitance ) At the very end add:CloudFlareRemoteIPTrustedP...
Read more