Resources

Blog

Abusing Data to Avoid Detection: Cybercriminal Adoption of Browser Fingerprinting

Browser fingerprinting is one of many tactics phishing site authors use to evade security checks and lengthen the lifespan of malicious campaigns. While browser fingerprinting has been used by legitimate organizations to uniquely identify web browsers for nearly 15 years, it is now commonly exploited by cybercriminals.
Guide

Download the "Webdocs Accounts Payable Automation Guide"

Learn About the Inefficiencies of Manual Accounts Payable (AP) Processing and How Webdocs for AP Eliminates Them Labor expenses typically consume 62% of total accounts payable costs. In other words, AP processes are intensive and inefficient when performed manually. Webdocs for AP's automation capabilities pave the way for user and departmental efficiency by lowering processing costs, creating...
Guide

UNIX Load Average Part 1: How It Works

In this online article Dr. Gunther digs down into the UNIX kernel to find out how load averages (the “LA Triplets”) are calculated and how appropriate they are as capacity planning metrics.
Guide

UNIX Load Average: Reweighed

This is an unexpected Part 3 to the discussion about the UNIX load average metric answering the question of where the weight factor comes from.
Guide

The “LA Triplets” Quiz

This is a little quiz to test your understanding of the triplet of numbers that appear in the UNIX® load average (LA) performance metric.