Articles

Lead Image Photo by Harli Marten on Unsplash

Lead Image Photo by Harli Marten on Unsplash

Platform independence with PowerShell Core

Microsoft has broken new ground with the release of PowerShell Core 6.0, which at heart is a complete reboot in terms of architecture and objectives. For the first time, a new version is not linked to the Windows operating system.
Photo by rawpixel on Unsplash

Photo by rawpixel on Unsplash

Protecting Samba file servers in heterogeneous environments

Because Samba can be integrated easily into heterogeneous environments, a kind of heterogeneous administration is often necessary, and security falls by the wayside. We show you how to use a Samba file server securely in heterogeneous environments.
Lead Image Photo by qinghill on Unsplash

Lead Image Photo by qinghill on Unsplash

AWS security scans with Scout2

Scout2 is an open source auditing tool that helps you keep your AWS environments secure.
Lead Image © Mikko J. Pitkänen, Fotolia.com

Lead Image © Mikko J. Pitkänen, Fotolia.com

Private cloud with Microsoft Azure Stack

Azure Stack is an Azure extension that implements an on-premises data center for consistent hybrid cloud deployments.
Photo by Joshua Earle on Unsplash

Photo by Joshua Earle on Unsplash

Monitoring and service discovery with Consul

When dozens of new services and VMs emerge and disappear every day in dynamic cloud environments, conventional monitoring provides false alarms, not operational security.
Lead Image © Kirsty Pargeter, 123RF.com

Lead Image © Kirsty Pargeter, 123RF.com

Optimizing Windows Server 2016 performance

With Windows Server 2016, tweaking the settings and taking advantage of performance monitoring tools can help boost your system's performance.
Photo by Geran de Klerk on Unsplash

Photo by Geran de Klerk on Unsplash

Detecting security threats with Apache Spot

Security vulnerabilities often remain unknown when the data they reveal is buried in the depths of logfiles. Apache Spot uses big data and machine learning technologies to sniff out known and unknown IT security threats.
Lead Image © abidal, 123rf.com

Lead Image © abidal, 123rf.com

Integrating scripts into Group Policy

Incorporating scripts into Group Policy can make a sys admin's job much easier.
Lead Image © Dmytro Demianenko, 123RF.com

Lead Image © Dmytro Demianenko, 123RF.com

Dialing up security for Docker containers

Docker containers are a convenient way to run almost any service, but admins need to be aware of the need to address some important security issues.
Lead Image © mikdam, 123RF.com

Lead Image © mikdam, 123RF.com

Preparing to move to the cloud

Because the cloud is ubiquitous, some companies think that outsourcing their business applications to Amazon, Google, and the like is a breeze. In fact, on the way, treacherous winds blow just off the beaten track.