Displaying 1 - 20 of 142
… A question of risk Submitted by John Locke on Wed, 07/27/2011 - 14:24 How … protect themselves from data loss: … A question of risk …
… A question of risk Submitted by John Locke on Wed, 07/27/2011 - 17:10 How … article on Freelock.com Client Spotlight … A question of risk …
… Managing change and risk with Drupal Hosting Submitted by John Locke on Mon, … it has been in production before it was discovered. We tag and back up the production site before deploying any … it has been in production before it was discovered. We tag and back up the production site before deploying any …
… Is your company’s website at risk of being hacked? We agree that there is a lot that a … business forward. … … Is your company’s website at risk of being hacked? …
… automation using the Drupal #AI module -- automatically tag your articles. With the AI module, its AI Automators … integrations, the great thing is you can easily edit the tags later if you want to highlight something specific, or if …
… files for security reasons. Switching between trunk and a tag So far so good. We have the basics of an application set … Simple. Just check it out: cd public_html/dojo git tag # shows you a list of available tags git checkout … on your project won't have those commits. You do risk breaking their development tree if you make a commit …
… on master is if we have to roll back to a previous release tag, if something truly went wrong. Staging is where things … a critical security update for this site? Is this a high risk vulnerability? (The vast majority of Drupal security …
… to a new point release of Drupal means merging the new tag into our branch. Then we've written a script to update … and the development copy on develop. And it created a git tag for the particular release. On production, we have … well go back to your previous night's backup, but now you risk losing a bunch of data, too! Alternative production …
… up to date. From our perspective, it's really a question risk management, balancing the need to keep the code running … Once the dev site is updated, we create a new release tag and push it into our central git repository, where … regular backups of the files. We do a final snapshot/tag of the production code base, then pull down the new …
… Loss of your data, or digital photos. Do you want to risk these things? In many cases, a weak password is all that … any particular system. Assess your risks There are low risk, and high risk computer systems. To avoid having 30 different passwords …
… and changing can be done after the site has launched. Low Risk There's lots of things that can go wrong with a … We do all kinds of things to make our service as risk-free as possible, including: Banning all use of insecure …
… and then shut them down when the attack is over -- with utility pricing an attacker can do a lot of damage at pretty … -- there are a bunch of ways reliance on a single vendor can cause major business disruption. We've written … <dd> <h1> <h2 id> <h3 id> <h4 id> <h5 id> <p> <br> <img src alt height width> Lines and paragraphs break …
… your customers' requests, and help you succeed online. Low Risk. With a low up-front cost and regular monthly billing, … any results. Our attention to security and our focus on risk management minimize the chances of catastrophe as the …
… backups don't matter. Being able to recover from whatever risk you face is what matters -- backups just help you do … really need is a "Disaster Recovery plan" that includes a risk matrix -- a summary of what risks you face, and steps to … just neglect keeping their computers up-to-date and not risk losing all of their data. Websites are next. We've seen …
… materials." The reason? You are taking on all the project risk. Risk is, after all, the big question when it comes to any …
… for ongoing service, updates, and improvements? How much risk is associated with a particular platform, based on what … work at lower cost over the long term, and lower their risks while we’re at it. If it’s in a neighboring technology, …
… processing service, and Now, everybody's talking about the risk to the consumer of doing online purchases, and all of … having credit cards. But consumers really don't have any risk here at all, thanks to Senator Proxmire thirty years … are great for consumers, but becoming more and more of a risk for merchants. Unless something is done to place the …
… concern to improve security on your site, to reduce the risk of certain attacks. When talking about security, the … thing to understand is that security is about managing risks, that no website is 100% secure, and that introducing … attack as is? What does it take to mitigate this risk? How much does the mitigation lower the chance of an …
… metrics to success and selecting a vendor, then finally risk tolerance and disaster recovery planning. We welcome … metrics to success and selecting a vendor, then finally risk tolerance and disaster recovery planning. We welcome …
… able to identify several big wins, such as: setup meta tag module, disabling php filters, fixing staff directory … able to identify several big wins, such as: setup meta tag module, disabling php filters, fixing staff directory …