Articles

Photo by Almos Bechtold on Unsplash

Photo by Almos Bechtold on Unsplash

Getting started with the Apache Cassandra database

The open source Apache Cassandra database claims to be fail-safe, economical, highly scalable, and easy to manage. A few exercises show whether it lives up to its advertising.
Lead Image © sandra zuerlein, Fotolia.com

Lead Image © sandra zuerlein, Fotolia.com

Arm yourself against cloud attacks

We present approaches and solutions for protecting yourself against attacks in the cloud.
Lead Image © Lucy Baldwin, 123RF.com

Lead Image © Lucy Baldwin, 123RF.com

Logical Bombs for Fun and Benchmarking

The admin can generate load a number of ways with shell commands.
Lead Image © lightwise, 123RF.com

Lead Image © lightwise, 123RF.com

Samba pitfalls in daily operation

Once you install Samba, you can still encounter errors, problems, and inconsistencies that plague your file server. We address some of these issues.
Lead Image Photo by Pierre Bamin on Unsplash

Lead Image Photo by Pierre Bamin on Unsplash

Test JavaScript programs with Karma

Web developers can test increasingly complex JavaScript applications in multiple browsers with the Karma testing environment.
Lead Image © Andrey KOTKO, 123RF.com

Lead Image © Andrey KOTKO, 123RF.com

Static code analysis finds avoidable errors

Static code analysis tools like JSLint, Splint, RATS, and Coverity help you find code vulnerabilities.
Lead Image © andegro4ka, 123RF.com

Lead Image © andegro4ka, 123RF.com

Get started with OpenShift

We help you get started with OpenShift and OKD using Minishift.
Lead Image © Antonella Grandoni , Fotolia.com

Lead Image © Antonella Grandoni , Fotolia.com

DNSSEC-aware DNS caching with Unbound

If you don't have access to a DNSSEC-aware name server, you can set up your own with Unbound.
Lead Image © Bruce Rolff, 123RF.com

Lead Image © Bruce Rolff, 123RF.com

Build a honeypot with real-world alerts

The honeyBot tools create a honeypot that activates an alert in the real world.
Photo by Rodolfo Sanches Carvalho on Unsplash

Photo by Rodolfo Sanches Carvalho on Unsplash

Docker image security analysis

Up your security by determining the provenance of a container image.