Jun 7, 2013
Matt Kuikman

This is the part where the training wheels come off and I impart a little bit of higher level paid search strategy that you can try to use on your own campaigns. If you’re not quite here, then perhaps go back and check out my previous two blog posts in this series. However, moving forward, […]

Markers on Mirrors Smart
Jun 5, 2013

This blog is a repost from Storage Switzerland, specifically Virtual and Physical Server SLA Deployment – SingleHop and reflects the views of their company. We thank Storage Switzerland for their independent analysis of our service. SingleHop, a US based, hosted IT infrastructure and Cloud computing provider, is capitalizing on their ability to quickly and securely automate the deployment of dedicated […]

Storage Switzerland
Jun 4, 2013
David Dunlap

We have been teasing our new Amsterdam data center since April and now, the ribbon has been cut and we are now live. The opening of our European data center is not just about opening a new location. It is about making strides towards our goal of offering a global service. Also it is about […]

Amsterdam Opening
Jun 4, 2013
Aaron Hutchens

Previously, we discussed the first three steps on reacting to a successful attack. This week we will finish off with the last two steps of this five step process. Step four: delegation of responsibilities Whoever owns the account is responsible for the code that they have uploaded. This means that due to liabilities it is […]

Prepare
Jun 2, 2013
Andrew Brooks

Continuing from out last post, welcome to part 2 of our series where we’ll be covering file fuzzing as it pertains to SCAD and ICS software. You may be asking yourself why we want to look at file format fuzzing, and the answer is easy to understand.  A majority of the SCADA software I’ve looked […]

Stack Trace
May 31, 2013
Matt Kuikman

In the last article we started things off with the basics of paid search. Now it’s time to take a deeper dive inside the inner workings of paid search.  Here is where we’ll learn the importance of quality scores, match type, and the proper way to set your bids. Knowing these elements and how they […]

sem_adwords
May 28, 2013
Aaron Hutchens

Some time ago I was called forth to write an article on securing a web hosting server; As web hosting Systems Administrators here at SingleHop this is a topic with which we are all fairly familiar. After enough CSF installs, SSH port changes, and package updates you find that it all becomes muscle memory allowing […]

halfsplouded
May 24, 2013
Matt Kuikman

In past articles we’ve gone to some pretty good lengths to teach you search engine optimization tips for optimizing your website to rank well in Google’s organic rankings.  However, organic search is just one aspect of search marketing.  So that’s why I’m changing things up a little this time. Today we are going to discuss […]

delicious
May 21, 2013
Andrew Brooks

In the past few years, particularly in the wake of Stuxnet, SCADA and ICS software has come under heavy scrutiny from the security community for a variety of poor programming practices which has unearthed some critical security issues like as memory corruption attacks, hardcoded credentials, broken crypto, and web-based attacks such as SQL injection and […]

Stack Trace
May 21, 2013
Marc Bollinger

As the demand for the consumption of computing resources becomes more relevant, it’s time to consider moving your infrastructure to a more flexible model, the cloud. I’d like to start off with a scenario: Suppose your SharePoint Solution is comprised of several physical servers: one with Active Directory, one with SQL Server, and one with the SharePoint application. Deploying […]

thumbnail