Articles

Floodlight: Welcome to the World of Software-Defined Networking

Software-Defined Networking (SDN) marks a paradigm shift toward a more holistic approach for managing networking hardware. The Floodlight OpenFlow controller offers an easy and inexpensive way to experience the power of SDN.

Totally Stressed

StressLinux helps you optimize your hardware and eke out more performance from individual components.

Managing Port Scan Results with Dr. Portscan

Regularly scanning the ports on your own network prevents intruders from sneaking in, but if you have dozens or hundreds of servers, you’ll need professional help: Dr. Portscan to the rescue.

SSH on Windows

For Linux admins, SSH is one the most important tools of remote administration. SSH also works in Windows, with tools such as PuTTY or WinSSH, MobaXterm, WinSCP, or Swish.

Monitoring Memory Errors

One resource extremely important to your applications is system memory, which is why many systems use error-correcting code (ECC) memory. ECC memory can typically detect and correct single-bit memory errors, and Linux has a reporting capability that collects this information.

VDI Basics

For years, the replacement of physical PCs with virtual PCs has been touted as a mass movement, but so far, the revolution has not taken place. We explore the background.

PC over IP

Anyone who has tried to to run graphics-intensive applications using an application-sharing protocol like RDP knows how miserably these technologies fail. But the PCoIP protocol and special hardware means that even heavy-duty workstations can operate remotely.

Total Network Monitor

Even Windows doesn’t have to have an expensive network monitoring tool. The free Total Network Monitor helps you keep an eye on your network.

IceWarp: MS Exchange Mail Server for Linux

Admins who use Microsoft servers don’t have to rely on Exchange for email with alternatives like the IceWarp mail server.

Centralized Password Management

Time and again, situations arise in which admins need access to a system they do not otherwise manage. But, do you want to hand over responsibility for password management to a centralized software? What capabilities must that software have?