The Domain Name System (DNS) has gone through many changes over the years since its birth around 1985. But even before this, in the very early days of computer networking, it became a necessity to map the computerised machine addresses of computer and network entities to more human friendly names.more →
We all recognise that testing your IT infrastructure is paramount to keeping your systems secure, and we always discuss this with all of our customers. However, when we start to talk about DDoS testing we are often met with the view that conducting pen testing is enough. This lead me to write this blog explaining the two methods of testing, how they differ and where they fit in your network security arsenal.more →
Onions have been cultivated for centuries for their characteristic, pungent aroma and flavour, as well as their medicinal properties. They can be as sweet and juicy as they can be spicy and tangy, and they host an abundance of vitamins, minerals, and anti-oxidants. Eating onions can reduce risk of heart disease, obesity, and cancer.more →
Life is busy, and the activereach team know all about hard work… but it is important to occasionally throw aside the responsibilities that keep us grounded, and embark on a memorable adventure which has no ties to your life. Of course, as I am referring to a team-spirited bungee jump outing, the ties I refer to are figurative –more →
Another high-profile website has suffered downtime as a result of a DDoS attack. This time is was the BBC. It is important for all organisations, hoping to avoid a similar fate, to review how the tech industry is reacting.
Project Shield from Google
Clicking through news articles related to the attack, filled with interchangeable clichéd phrases, I stumbled across this announcement of the expansion of Project Shield from Google.more →
Phishing is a malicious social engineering technique which leverages email and appears to come from a trusted source so as to acquire sensitive information such as usernames, passwords, and credit card details. Phishing attacks may also be designed to fool email recipients into downloading malware onto their computers.more →