In this video we are going to explain you how to set up and manage a configuration for a domainwide directory share via the Univention Management Console.
In its simplest terms, virtualization is the replication of hardware resources via software implementations. It is employed in particular to provide multiple server systems on a single hardware system. Although I want to concentrate on the virtualization of server systems in this article, it is important to mention that these principles are also being applied ever more frequently in the fields of network technology and data storage as well as on clients too.
In this video tutorial we give you a short introduction into the Univention App Center. The App Center is a central feature of Univention Corporate Server which allows you to easily install and manage additional UCS components and business applications of third-party vendors. You can thus adjust your IT infrastructure to your personal needs at any time. One crucial and great benefit of the App Center is the central management of all apps including their users via the UCS management system.
More on this in the following video!
What are “Cool Solutions”?
Cool Solutions is the name we use to describe Univention solutions which expand UCS with practical, advantageous functions and are also sometimes employed by our customers. These solutions are regularly presented in the Univention Wiki in the form of Cool Solutions articles.
In a new series of articles, we want to introduce you to the five most popular “Cool Solutions” over the next few weeks. Today we are starting with Guacamole – and no, we don’t mean the tasty Mexican dip this time.
The threat posed by ransomware such as Locky and other malware has been a hot topic on and off in the media for months now. In a number of cases, including some rather more prominent ones, hackers have managed and continue to manage to infect their victims’ files with malware, which encrypts them to the point where they can no longer be used – the files are only made available again once a “ransom” has been paid. The more accesses the user in question has, the higher the damage: if possible, files on servers in the network are also “captured”.
A great deal has already been written on the topic. At this point, I would like – albeit very subjectively – to introduce a couple of approaches for how to protect yourself against such attacks.
UCR is the central tool for the management of the local system configuration of a UCS-based system. It releases you from the manual editing of sensitive configuration files.
In this video tutorial we explain how you can easily administrate your local system configuration in Univention Corporate Server via Univention Configuration Registry (UCR).
When it comes to network security, one of the greatest security gaps is still the “human factor”, especially through private Internet use at the work place. In addition to private e-mails, the ever increasing reach of social networks is currently representing a great challenge. Viruses and other malware from the web seek out exactly these weaknesses. Attacks increase on a daily base and businesses in all industries and of all sizes, must implement ever more sophisticated standards for protection.