Articles

Putting Windows 8 on a USB Drive

You don’t have to buy Windows 8 Enterprise Edition to create a Windows To Go USB drive, nor do you have to buy an expensive, certified USB disk to make it work.

Network Grep

Ngrep is a pattern-matching tool that sorts the wheat from the chaff and doubles as a lightweight packet sniffer.

Analyzing Kernel Crash Dumps

If the Linux server crashes, not only do you need to restore operations, you also need to analyze the problem. A kernel crash dump at the time of the crash can be a big help.

Hyper-V 3.0 in Windows Server 2012

In the old Hyper-V hypervisor from Microsoft, many features for professional use were missing. The new version 3.0 has been significantly improved and is slowly catching up to VMware.

Automating with Expect Scripts

Expect is a unique scripting language that emulates keystrokes by responding to expected responses from a local or remote system. Think of Expect as an automated, virtual you.

Tricking Intruders with HoneypotMe

A honeypot is a specialized security tool that pretends to be an ordinary system to attract and identify attackers. Experienced intruders, however, are not so easily fooled. An experimental new technology known as HoneypotMe moves honeypot functionality to real systems on the production network.

Increasing Throughput with Link Aggregation

For once, admins and users agree: They want more resiliency and higher bandwidth on the network. Link aggregation, in line with IEEE 802.1ax b-2008, offers both – with some minor restrictions.

Stopping Side Channel Attacks

Sometimes error messages or log entries are too verbose for their own good, disclosing valuable information to attackers.

Automation Scripting with PHP

PHP is a powerful scripting language that has built-in database connectivity, simple syntax, one of the world’s largest support groups, and respect in enterprise scripting circles. When you have a scripting problem, PHP is good for what ails you.

Secure Your Server with TCP Wrappers

TCP Wrappers are versatile, sophisticated, and surprisingly easy to use, and they can secure your servers from attack with run-time ACL reconfiguration.