Infrastructure at your Service



Elisa Usai

The evolution of MySQL authentication mechanism

By | Database Administration & Monitoring, Database management, Security | No Comments

The authentication, the first level of security for each IT system, is the stage to verify the user identity through the basic username and password scheme. It is crucial to have a mechanism to protect and secure password storing and transmitting over network. In MySQL, there is plenty of different authentication methods available, and last versions improved the security of this concept.

Read More
Stéphane Savorgnano

Recover data from Azure backup

By | Operation systems, Security, Technology Survey | No Comments

During my last blog-post I experienced to use Azure backup to protect an on-premise Windows server. To recover data from Azure backup we need to use the Microsoft Azure Recovery Services console (MARS). This service and its management console have been installed during the setup of the Azure backup in the Windows Admin Center. When we open the Microsoft Azure Backup console, we directly visualize the jobs activity for the last 7 days in the…

Read More
Dominique Althuser

Email Spoofing

By | Security | No Comments

Have you ever had this unhealthy sensation of being accused of facts that do not concern you? To feel helpless in the face of an accusing mail, which, because of its imperative and accusing tone, has the gift of throwing us the opprobrium? This is the purpose of this particular kind of sextortion mail that uses spoofing, to try to extort money from you. A message from a supposed “hacker” who claims to have hacked…

Read More