Business Empowerment: Where Information Technology Intersects Growth

When individuals contemplate IT they typically reflect on the ways in which they have been exposed and impacted by IT services. Often services like setting up computers and fixing printers come to mind. These services frequently equate to “IT help”...

Active Directory Authenticated CIFS(Samba) File Sharing w/Ubuntu 20.04

A while back, we looked at setting up a CentOS 8 CIFS file server with Active Directory Authentication. This blog will go through the same exercise, except using Ubuntu Linux 20.04 LTS. While there are many approaches to making this setup work, we...

Linux Version 8 On Windows Subsystem for Linux

*This Blog is an updated version to the previously published blog Centos Linux Version 8 on Windows Subsystem for Linux

Last year we looked at installing CentOS 8 on Windows 10 WSL. In the past year, there have been many changes to both CentOS and...

Log4Shell: rethinking your environment and using external code

 

Log4Shell (CVE-2021-44228) struck fear in many IT departments, CISOs, and vendors - an easily exploitable remote execution vulnerability in a ubiquitous Java module used by many, many applications. Companies are still reeling from the impact and...

Exploring Options for AV in Hybrid Work Environments

As the pandemic continues and employees return to their offices in different capacities, many companies are interested in setting up AV systems in their conference rooms and huddle spaces that allow for a more seamless hybrid work environment....

Subscribe Here For Our Blogs:

Recent Posts