Articles

Lead Image © wamsler, 123RF.com

Lead Image © wamsler, 123RF.com

Protect yourself from infected MS Office files

Attacks on Microsoft Office files are increasing. A multilayered approach is your best protection against this malware.
Lead Image © plus69, 123RF.com

Lead Image © plus69, 123RF.com

Affordable hardware switch for SDN

Most OpenFlow-ready hardware switches are prohibitively expensive if you just want to set up a small-scale test lab. Northbound Networks has stepped in with a Kickstarter campaign, filling the gap with the Zodiac FX switch.
Lead Image © smeagorl, 123RF.com

Lead Image © smeagorl, 123RF.com

Swagger and OpenAPI Specification for documents

A REST API is especially useful for a developer if the API provider extensively documents the methods used. The Swagger tools not only semiautomatically generate an API reference, but a matching client SDK for many programming languages, as well.
Lead Image © Morganimation, fotolia.com

Lead Image © Morganimation, fotolia.com

The practical benefits of network namespaces

With network namespaces, you can create very sophisticated and resource-saving setups using the tools inside a running Linux system – without the use of containers.
Lead Image © Orlando Rosu, 123RF.com

Lead Image © Orlando Rosu, 123RF.com

Visualizing data captured by nmon

When speed, ease of use, and time to answer are paramount in performance monitoring and assessment of nmon logfiles, onTune nmon Analyzer Plus for Windows can help.
Lead Image © Amy Walters, 123RF.com

Lead Image © Amy Walters, 123RF.com

DDoS protection in the cloud

OpenFlow and other software-defined networking controllers can discover and combat DDoS attacks, even from within your own network.
Lead Image © Kritiya Sumpun, 123RF.com

Lead Image © Kritiya Sumpun, 123RF.com

Systemd network management and container handling

Version 219 of the controversial systemd init system introduces a number of comprehensive changes. We take a closer look at the innovations in network management and container handling.
Lead Image © almagami, 123RF.com

Lead Image © almagami, 123RF.com

Attacks on HTTPS Connections

HTTPS protects a connection from both tapping and manipulation, but only if a man in the middle hasn't already infiltrated the Internet connection. We highlight the weaknesses in HTTPS and demonstrate how to protect your client and server.
Lead Image © Stuart Miles, 123RF.com

Lead Image © Stuart Miles, 123RF.com

Getting a free TLS certificate from Let's Encrypt

A free TLS certificate from Let's Encrypt means you can add encryption to your network for no cost, so you don't have any more excuses for failing to encrypt.
Lead Image © iofoto, Fotolia.com

Lead Image © iofoto, Fotolia.com

Multifactor authentication with Google Authenticator

Google Authenticator provides one-time passwords to smartphone owners for multifactor authentication, or you can integrate it into other applications, such as blogs.