Articles

Lead Image © Volodymyr Krasyuk, 123RF.com

Lead Image © Volodymyr Krasyuk, 123RF.com

iSCSI: Set up and use LIO targets

The LIO multiple-protocol SCSI target is perfectly suited for complex test environments, especially because of its support for SCSI standards across the board.
Lead Image © momo5287, 123RF.com

Lead Image © momo5287, 123RF.com

TCP Stealth hides open ports

Port scans for finding vulnerable services are nothing new, and port knocking as a defense has been around for a while, too. TCP Stealth tries to do something similar, but it takes a more sophisticated approach. We take a closer look.
Lead Image © agencyby, 123RF.com

Lead Image © agencyby, 123RF.com

Comparing Ceph and GlusterFS

Many shared storage solutions are currently vying for users’ favor; however, Ceph and GlusterFS generate the most press. We compare the two competitors and reveal the strengths and weaknesses of each solution.
Lead Image © Vlad Kochelaevskiy, Fotolia.com

Lead Image © Vlad Kochelaevskiy, Fotolia.com

Scalable mail storage with Dovecot and Amazon S3

Admins can solve typical mail server scalability problems with Dovecot’s Amazon S3 plugin and the Ceph distributed object store.
Lead Image © insima, 123RF.com

Lead Image © insima, 123RF.com

Security in the network with Kali Linux

Thanks to its huge choice of security tools, Linux is perfectly suited to securing heterogeneous networks. With a specialized distro like Kali Linux, you can quickly locate and eliminate security vulnerabilities.
Lead Image © SV-Luma, 123RF.com

Lead Image © SV-Luma, 123RF.com

Optimizing utilization with the EDF scheduler

The superior "Earliest Deadline First" task scheduling method has been part of Linux since kernel 3.14.
Lead Image © Maksim Kabou, 123RF.com

Lead Image © Maksim Kabou, 123RF.com

From debugging to exploiting

Kernel and compiler security techniques, together with sound programming practices, fend off memory corruption exploits.
Lead Image © Orlando Rosu, 123RF.com

Lead Image © Orlando Rosu, 123RF.com

DIME and Dark Mail seek to change the world of digital mail

Email has the reputation of being insecure, unreliable, and easily readable for any user – just like a postcard. An initiative led by the founders of Lavabit and PGP hopes to replace email with a new medium.
Lead Image © mopic, 123RF.com

Lead Image © mopic, 123RF.com

Data Analysis with R and Python

The statistical programming language R dissects its database in a masterful way, and you can embed your R in Python using the Rpy2 interface.
Lead Image © nerhuz, 123RF.com

Lead Image © nerhuz, 123RF.com

Transport Encryption with DANE and DNSSEC

Those who think that enabling STARTTLS in the mail client will make their mail traffic more secure are wrong. Only those who bank on DANE can be sure that a mail server or a firewall will not switch off encryption in transit.