Details
Admin News
Qualcomm bug threatens millions of Android devices.
More Stories
Windows 10 store access, JBoss vulnerability, and bypassing AppLocker
IPv6 Migration
Planning Careful planning and a systematic approach are critical to a successful transition to IPv6
Intel QuickAssist
QuickAssist technology offloads computationally intensive compression and encryption tasks.
Atomic
Create a custom Atomic software repository for this Red Hat Linux distro for container environments.
Drupal 8 Core Multilingual
Thanks to the Drupal 8 Multilingual Initiative, you can exercise granular control over the languages on your website.
Organizing for Containers
Container technology and work organization.
OpenShift
Red Hat's OpenShift is aimed at companies seeking low-maintenance PaaS environments for developing and testing applications.
Ceph Jewel
The Ceph object store remains a project in transition: The developers announced a new GUI, a new storage back end, and CephFS stability in the just-released Ceph c10.2.x, Jewel.
Let's Encrypt
A free TLS certificate from Let's Encrypt means you can add encryption to your network for no cost.
Google Authenticator
Google Authenticator provides onetime passwords to applications and smartphone owners for multifactor authentication.
XSiBackup
VMware ESXi virtualization is free, but it does not include a software tool for backing up virtual servers.
Hyper-V Virtual Networks
Microsoft provides some interesting virtualization features in current and future versions of Windows Server.
Live VM Migration
The KVM hypervisor supports live migration for virtual machines.
MS Operations Manager
Put Operations Manager to work monitoring Active Directory, Exchange, and Hyper-V environments.
DevOps and Containers
Containers are an essential ingredient for DevOps environments, but used incorrectly, they do more harm than good.
systemd Tips
Version 219 of the controversial systemd init system introduces a number of innovations for managing networks and handling containers.
Linux Filesystems
Linux filesystems range from blockbased network filesystems, to temporary filesystems in RAM, to pseudo filesystems. We explore some popular alternatives.
HTTPS Attacks
HTTPS protects a connection from both tapping and manipulation, but only if a man in the middle hasn't already infiltrated the Internet connection.
Public Key
Pinning Use public key pinning to map certificates to specific domains. innovations for managing networks and handling containers.
Additional Information
Delivery time | It could take up to 4 weeks depending on your delivery region |
---|