Webmaster Forums Top AMP Questions

It has been busy here at Google Webmaster Central over the last few weeks, covering a lot of details about Accelerated Mobile Pages that we hope you have found useful. The topics have included: What is AMP? How to get started with Accelerated Mobile Pages How can Google Search Console Continue Reading

Enabling Windows Server 2016 and Hyper-V virtualization based security features on other platforms

  • in Blog Posts
  • by
  • September 30, 2016
  • Comments Off on Enabling Windows Server 2016 and Hyper-V virtualization based security features on other platforms

This post was authored by Mike Schutz, General Manager, Cloud Platform. Security is a top-of-mind topic for every organization. This is why Microsoft is investing deeply to provide advanced security across our technology portfolio. With the launch of Windows Server 2016 this week, we introduced new advanced multi-layer security capabilities Continue Reading

Q&A: Threat Intelligence and the Threat Landscape

 Providing holistic, actionable security intelligence across the entire IT infrastructure is critical for the future of cybersecurity. Fortinet’s Matti Blecher offers his perspective here. Can you give us a glimpse into the threat landscape from a threat intelligence point of view? What are customers facing today? One of the biggest Continue Reading

Bing Enhances the Copyright Infringement Claims Process with New, Easy-to-Use Dashboard

  • in Blog Posts
  • by
  • September 29, 2016
  • Comments Off on Bing Enhances the Copyright Infringement Claims Process with New, Easy-to-Use Dashboard

Lack of communication is a leading cause of divorce. Communication is vital, and sharing the status of a copyright infringement notice is no exception. Which is why Bing just made this easier. A new online dashboard provides insight into the status of a copyright removal request, as well as providing Continue Reading

ISPConfig Billing Module 2.0 for ISPConfig 3.1 released

ISPConfig Billing Module 2.0 for ISPConfig 3.1 released – ISPConfig The ISPConfig Billing module for ISPConfig 3.1 is available now. What’s new in ISPConfig Billing 2.0? Complete new UI, compatible with ISPConfig 3.1 Export function for invoices and refunds in CSV format. A new manual is available for the Billing Continue Reading

Red Hat Drives DevOps Adoption and Application Scalability with Latest Version of Red Hat OpenShift Container Platform

  • in Blog Posts
  • by
  • September 27, 2016
  • Comments Off on Red Hat Drives DevOps Adoption and Application Scalability with Latest Version of Red Hat OpenShift Container Platform

RALEIGH, N.C. — September 22, 2016 — Red Hat, Inc. (NYSE: RHT), the world’s leading provider of open source solutions, today announced Red Hat OpenShift Container Platform 3.3, bringing new developer features and deployment scalability, on a secure enterprise container platform, to improve application delivery across the hybrid cloud. Red Continue Reading

Hostname SSL with Letsencrypt

Letsencrypt SSL Installation for Hostname – How to guide 1st you need to add the subdomain to your DNS manager and point it to the server, also you need to add the sudomain through Vhost by adding bellow lines to the new file /usr/local/apache/conf.d/vhosts-hostname.conf # vhost_start host.hostname.com ServerName host.hostname.com ServerAlias Continue Reading

How we brought HTTPS Everywhere to the cloud (part 1)

CloudFlare’s mission is to make HTTPS accessible for all our customers. It provides security for their websites, improved ranking on search engines, better performance with HTTP/2, and access to browser features such as geolocation that are being deprecated for plaintext HTTP. With Universal SSL or similar features, a simple button Continue Reading

Microsoft Removed Journal From Windows Due To Security Issues

Last month, Fortinet researcher Honggang Ren discovered a heap overflow vulnerability in Windows Journal and reported it to Microsoft. This month, Microsoft released update KB3161102 and removed the Journal component from all versions of Windows because the file format used by Journal has been demonstrated to be susceptible to a Continue Reading

ISPConfig 3.1 RC 2 released for testing

What’s new in ISPConfig 3.1 ISPConfig 3.1 is the next generation of the ISPConfig hosting control panel with a completely renovated UI and a lot of new features. Here a few highlights: New responsive User Interface based on the Bootstrap framework. The interface is responsive now which makes it easy Continue Reading

An overview of TLS 1.3 and Q&A

The CloudFlare London office hosts weekly internal Tech Talks (with free lunch picked by the speaker). My recent one was an explanation of the latest version of TLS, 1.3, how it works and why it’s faster and safer. You can watch the complete talk below or just read my summarized Continue Reading

Penguin is now part of our core algorithm

Google’s algorithms rely on more than 200 unique signals or “clues” that make it possible to surface what you might be looking for. These signals include things like the specific words that appear on websites, the freshness of content, your region and PageRank. One specific signal of the algorithms is Continue Reading

GitLab 8.12 Released with Cycle Analytics and Global Code Search

Whether you’re working on a small or a large project, your tools should get out of your way and give you actionable feedback. This month, we’re making sure GitLab does both better than ever. GitLab 8.12 gives you feedback on how efficiently you actually work, helps you find code across Continue Reading

Q&A: The Fortinet Veterans Program – Taking on the Cybersecurity Talent Gap

  • in Blog Posts
  • by
  • September 23, 2016
  • Comments Off on Q&A: The Fortinet Veterans Program – Taking on the Cybersecurity Talent Gap

The talent shortage in the world of cybersecurity is real, and it’s growing. One of the ways Fortinet is addressing that talent gap is through the Fortinet Veterans Program. The mission of the Fortinet Veterans Program is to give Armed Services veterans across the country the training and mentoring needed Continue Reading

Webcast: Hardening Microservices Security

Microservices is one of the buzz words of the moment. Beyond the buzz, microservices architecture offers a great opportunity for developers to rethink how they design, develop, and secure applications. On Wednesday, September 21st, 2016 at 10am PT/1pm ET join SANS Technology Institute instructor and courseware author, David Holzer, as Continue Reading

MySQL Group Replication for MySQL 5.7.15

Hi all, it is time again to do another preview release of MySQL Group Replication, the plugin that brings multi-master update everywhere support to MySQL, like we described in the Hello World post. We are very proud to present the eighth preview release of MySQL Group Replication plugin, based on Continue Reading

Community Infrastructure Maintenance Window: Oct-10-2016

Community Infrastructure Maintenance Window: Oct-10-2016 Tuesday , 20, September 2016 bstinson Uncategorized The CentOS Infrastructure team will be moving the machines hosting cbs.centos.org, ci.centos.org and accounts.centos.org on October 10th, 2016. We expect a downtime of 48hrs. Contact us in #centos-devel on freenode at any time during that period for questions, Continue Reading

CloudFlare’s new WordPress plugin

Over 25% of all websites use WordPress, and over 10% of all internet traffic flows through CloudFlare; WordPress + CloudFlare has always been a winning combination, and now with CloudFlare’s new WordPress plugin, it’s easier than ever to make your site 60% faster. Install or upgrade to CloudFlare’s new plugin Continue Reading

cPanel TSR-2016-0005 Announcement

cPanel TSR-2016-0005 Announcement cPanel has released new builds for all public update tiers. These updates provide targeted changes to address security concerns with the cPanel & WHM product. These builds are currently available to all customers via the standard update system. cPanel has rated these updates as having CVSSv2 scores Continue Reading

Medical Device Security: The Continued Concern

During the 1990s, investment in medical device research and development more than doubled. Fast-forward to today, and the United States reportedly boasts the largest medical device market in the world (valued at around $148 billion). This charge into the future is showing no signs of slowing down, as its value Continue Reading

How to best evaluate issues with your Accelerated Mobile Pages

3. AMP Web Validator The AMP Web Validator, available at validator.ampproject.org, provides a simple web UI to test the validity of your AMP pages. To use the tool, you enter an AMP URL, or copy/paste your source code, and the web validator displays error messages between the lines. You can Continue Reading

Threat Intelligence Roundup – September 16, 2016

This week’s FortiGuard Threat Intelligence Brief reports on a spike in an Android advertising library, a fake series of banking sites used to phish credentials, as well as a campaign using the old faithful “we couldn’t deliver your package” courier scam. While hackers weren’t quite as active as they were Continue Reading

Red Hat Announces Plans for New Facility in Boston

RALEIGH, N.C. — September 15, 2016 — Red Hat, Inc. (NYSE: RHT), the world’s leading provider of open source solutions, today unveiled plans to expand its footprint to Boston. At its new facility, located at 300 A Street in the Fort Point neighborhood of Boston’s Seaport District, Red Hat plans Continue Reading

How can Google Search Console help you AMPlify your site?

If you have recently implemented Accelerated Mobile Pages on your site, it’s a great time to check which of your AMP pages Google has found and indexed by using Search Console. Search Console is a free service that helps you monitor and maintain your site’s presence in Google Search, including Continue Reading

8 Questions to Ask About Your eCommerce Search Function (Part one: questions 1 to 4)

  • in Blog Posts
  • by
  • September 16, 2016
  • Comments Off on 8 Questions to Ask About Your eCommerce Search Function (Part one: questions 1 to 4)

Customers who use on-site search are far more likely to convert than those who simply browse for what they want. To ensure the best possible conversion rates and user experience retailers should analyse the performance and functionality of their on-site search. In this two-part article, we will examine the first Continue Reading

Why CFOs Need to be Drivers of Security Stewardship

When a natural disaster hits, communities are often caught off guard and have to rush to respond. More often than not, these communities didn’t anticipate the disaster and therefore are operating in reactive mode. If they had planned ahead, much of the trauma and impact of the disaster could have Continue Reading

Red Hat Adds QuickStart Cloud Installer to Red Hat Cloud Suite to Help Speed Private Cloud Deployments

  • in Blog Posts
  • by
  • September 15, 2016
  • Comments Off on Red Hat Adds QuickStart Cloud Installer to Red Hat Cloud Suite to Help Speed Private Cloud Deployments

RALEIGH, N.C. — September 14, 2016 — Red Hat, Inc. (NYSE: RHT), the world’s leading provider of open source solutions, today introduced QuickStart Cloud Installer as part of Red Hat Cloud Suite, its pre-integrated set of cloud technologies. With the web-based, graphical QuickStart Cloud Installer, users can orchestrate the installation Continue Reading

Securing The Internet of Things – Industrial Control Systems

The Internet of Things (networks of uniquely identifiable endpoints, or “things,” that communicate without human interaction using embedded IP connectivity) is the next industrial revolution. Estimates say there will be 24 Billion IoT devices installed by 2020, and $6 Trillion will be invested in IoT devices over the next 5 Continue Reading

Herzog Technologies Drives Intelligent Railway Safety Solution with Red Hat

  • in Blog Posts
  • by
  • September 14, 2016
  • Comments Off on Herzog Technologies Drives Intelligent Railway Safety Solution with Red Hat

RALEIGH, N.C. — September 13, 2016 — Red Hat, Inc. (NYSE: RHT), the world’s leading provider of open source solutions, today announced that Herzog Technologies, a leader in the railroad signal and communications industry, has launched a cloud-based positive train control (PTC) solution using Red Hat technologies. The enterprise-grade foundation Continue Reading

Fortinet at HPE Protect (Sept. 13-16, 2016)

I’m excited to be at Protect 2016, HPE’s largest security event of the year! Over 2,000 security professionals at the event will explore an integrated approach to security and risk management, and learn how to make effective security simple. At Fortinet, we hold similar values. The modern response to increasingly Continue Reading

Threat Intelligence Roundup September 09, 2016

This is our third week of the roundup, and things in the cyberthreat world continue to be interesting, including the return of several attacks we have seen for years. Here’s a quick summary of what happened this week. 1. It’s Still About Ransomware. While last week’s spike seems to have Continue Reading

MailEnable Version 9.18 Release

RSS: MailEnable Version 9.18 Release MailEnable version 9.18 for Standard, Professional, Enterprise and Premium Editions is available for download from the MailEnable Web Site. The following change list outlines changes in version 9.18: RECENT CHANGES FIX: Services did not allow for a large number for bindings (other than specifying to Continue Reading

ISPConfig Migration Tool 1.4.4 released

ISPConfig Migration Tool 1.4.4 released – ISPConfig The migration tool helps you to import data from other control panels (currently ISPConfig 2 and 3, Plesk 10 – 12.5 and Confixx 3) into a new ISPConfig 3 or ISPConfig 3.1 single- or multiserver installation. The tool can also be used to Continue Reading

What is AMP?

In advance of AMP expanding in Google Search, over the next few weeks we’ll be posting pointers to help you #AMPlify your site. Follow along with the #AMPlify hashtag on G+ and Twitter. Have you already built AMP pages for your site? Share your feedback in the comments below or Continue Reading

Cybersecurity: A Business Enabler for Leading Global Financial Institutions

Financial cybersecurity has become a front-and-center topic due to a number of recent high-profile breaches. In the last few months, we have witnessed one of the largest bank robberies ever – a whopping $81 million taken during the digital Bangladesh Bank heist. On the heels of the Bangladesh Bank heist, Continue Reading

Today’s Retail Network and Security Requirements

For retailers with many geographically dispersed shops or stores, having secure network connectivity and linking all sites to the head office has become the glue of critical operating processes, such as the Point of Sale (PoS), accounting, inventory control, pricing, customer relationship management applications, and other business services. The in-store Continue Reading

Q&A: Information Sharing and Trust in Cybersecurity Today

With cybercrime such a big concern these days, cooperation and information sharing between public and private organizations has never been more important. We recently talked with Derek Manky, Global Security Strategist at Fortinet, to get his thoughts on the difficulty, and importance, of trusted networks for sharing information in the Continue Reading

A reminder about widget links

Google has long taken a strong stance against links that manipulate a site’s PageRank. Today we would like to reiterate our policy on the creation of keyword-rich, hidden or low-quality links embedded in widgets that are distributed across various sites. Widgets can help website owners enrich the experience of their Continue Reading

Synacor Launches New Support Program for 400+ Million Zimbra Open Source Users

Marks continued commitment to Open Source Edition of Zimbra Creates increased value of open source deployments Adds New Zimbra Suite Plus features: Mobile sync, Backup, Storage and Admin tools BUFFALO – September 8, 2016 – Synacor, Inc. (Nasdaq:SYNC), the trusted multiscreen technology, and monetization partner for video, internet and communications Continue Reading

Updated CentOS Vagrant Images Available (v1608.01)

Updated CentOS Vagrant Images Available (v1608.01) Wednesday , 7, September 2016 Laurențiu Păncescu announcement Official Vagrant images for CentOS Linux 6 and CentOS Linux 7 for x86_64 are now available for download, featuring updated packages to 31 August 2016, as well as a new image for VMware Fusion. Known Issues Continue Reading

WordPress 4.6.1 Security and Maintenance Release

WordPress 4.6.1 is now available. This is a security release for all previous versions and we strongly encourage you to update your sites immediately. WordPress versions 4.6 and earlier are affected by two security issues: a cross-site scripting vulnerability via image filename, reported by SumOfPwn researcher Cengiz Han Sahin; and Continue Reading

Red Hat Delivers Functionality Updates Across Multiple OpenStack Services with General Availability of Red Hat OpenStack Platform 9

  • in Blog Posts, Red Hat
  • by
  • September 7, 2016
  • Comments Off on Red Hat Delivers Functionality Updates Across Multiple OpenStack Services with General Availability of Red Hat OpenStack Platform 9

RALEIGH, N.C. — August 31, 2016 — Red Hat, Inc. (NYSE: RHT), the world’s leading provider of open source solutions, today announced the general availability of Red Hat OpenStack Platform 9, its highly scalable, open Infrastructure-as-a-Service (IaaS) platform designed to deploy, scale and manage private cloud, public cloud, and Network Continue Reading

Threat Intelligence Roundup – September 02, 2016

August ended with the spike in malware activity we predicted last week to welcome everyone back to school and work. Here is a summary of this week’s FortiGuard Threat Intelligence Brief. 1. Ransomware explodes. Ransomware took off this week, filling nine of our weekly top-ten malware detection list slots. Not Continue Reading

Gone missing: the day a few group members went silent!

Group Replication introduces a new way to do replication in MySQL. With great features such as multi-master replication it brings a range of exciting deployment scenarios where some difficult problems become much easier to solve. Relying on a Consensus protocol – Paxos, to achieve its goal, sometimes we can get into situations where we Continue Reading

4 tips to boost international sales quickly

Learn from the expert! Spanish payment advisor Steven Beamer from Ingenico, gives us the low down on on how to boost international sales quickly in four simple and insightful tips. We talk about the importance of creating a local personalised customer experience to being change ready.  So, if you are Continue Reading

After 4 days, Gabon is getting back on the Internet

On September 1, we reported that we had seen a complete shutdown of Internet access to CloudFlare sites from Gabon. This morning, Internet connectivity in Gabon appears to have been at least partially restored starting at around 0500 UTC. Some news reports indicate that Internet access has been restored in Continue Reading

Unrest in Gabon leads to Internet shutdown (updated)

A second day of rioting in Gabon after the recent election is accompanied by an Internet blackout. Residents of the capital, Libreville, reported that Internet access had been cut and we can confirm that we saw a sudden shutdown of Internet access from Gabon to sites that use CloudFlare. These Continue Reading

Take it Easy, and Say Hi to This New Python Ransomware

A new ransomware variant, named “Fsociety Locker” (“Fsociety ALpha 1.0”), showed up recently seeking a place in the threat marketplace. The authors of this malware must be “Mr. Robot” fans, as the name “Fsociety” refers to the fictional group of hackers in that show. This new ransomware variant is one Continue Reading

Cyber Criminals Set Sights On Carrier Networks  

Can mobile carriers afford to put the loyalty of 47 percent of their customers at risk in the wake of a security breach? These are the stakes, according to a Nokia survey of more than 20,000 global customers. Carrier networks are at the forefront of today’s service revolution. With the Continue Reading

Continuous integration tests for the CentOS Vagrant images

Continuous integration tests for the CentOS Vagrant images Thursday , 1, September 2016 Laurențiu Păncescu cico Since yesterday, we have production-ready automated tests for our Vagrant images on ci.centos.org, fully integrated with GitHub. We were only able to build and test scratch images manually until now, which was time consuming Continue Reading

Security Webcast with Yubico

Git is distributed, meaning that people can maintain a copy of the source code. While Git’s distributed nature is what makes it so popular amongst developers, it is also what makes it a security concern to enterprises. The concern is that your source code is only as secure as the Continue Reading

Fake-Game: The Emergence of a Phishing-as-a-Service Platform

Malware-as-a-Service (MaaS) business models continue to thrive in the cyber underground. It has allowed cyber crooks to generate renewable income through renting malware rather than selling their tool for a one-time payment. As a result, the business model has been adopted in various underground commodities such as exploit kits and Continue Reading

11.52 EOL in One Month

cPanel & WHM 11.52 is set to reach End of Life at the end of September, 2016. In accordance with our EOL policy ( https://go.cpanel.net/longtermsupport ), 11.52 will continue functioning on servers where it is already installed. However, no further updates, such as security fixes and installations, will be provided Continue Reading

Q&A: Protecting Businesses while Migrating to Clouds and Software-Defined Data Centers with Fortinet

  • in Blog Posts
  • by
  • September 2, 2016
  • Comments Off on Q&A: Protecting Businesses while Migrating to Clouds and Software-Defined Data Centers with Fortinet

As businesses require more speed and flexibility in delivering applications and services, cloud computing has emerged as the model best aligned to meet the needs of many organizations. Data centers especially are evolving rapidly into both private and public clouds, along with customer demands for fast and secure cloud infrastructure Continue Reading

[SingCERT] Advisory on Shadow Brokers Leaked Tools Targeting Popular Network Devices

  • in Blog Posts
  • by
  • September 1, 2016
  • Comments Off on [SingCERT] Advisory on Shadow Brokers Leaked Tools Targeting Popular Network Devices

Background On 13 August 2016, a group named Shadow Brokers released a large number of hacking tools that were targeting specific network devices. These included Cisco, WatchGuard and Fortinet equipment. The leaked files contain exploits, discovery tools, implants and documentation on how to use the tools. Users and organizations that Continue Reading

>