Articles

Lead Image © arsgera, 123RF.com

Lead Image © arsgera, 123RF.com

Linux Storage Stack

Abstraction layers are the alpha and omega in the design of complex architectures. The Linux Storage Stack is an excellent example of well-coordinated layers. Access to storage media is abstracted through a unified interface, without sacrificing functionality.
Lead Image © Juthamas Oonhawat, 123RF.com

Lead Image © Juthamas Oonhawat, 123RF.com

Network virtualization with OpenDaylight

OpenDaylight provides a flexible solution for setting up a software-defined networking environment. We show you how to get started.
Lead Image © kangshutters, 123RF.com

Lead Image © kangshutters, 123RF.com

Monitoring containers

A monitoring system helps avoid unpleasant surprises during operations, but admins need to modify existing solutions to fit a containerized world.
Lead Image © Paul Herbert, 123RF.com

Lead Image © Paul Herbert, 123RF.com

Exploring dhcpy6d, a DHCP server for IPv6 networks

Even if you don't have to have DHCP on your IPv6 network, you might want it anyway. Dhcpy6d is a promising DHCP option for IPv6.
Lead Image © Jenzig, photocase.com

Lead Image © Jenzig, photocase.com

Ansible as an alternative to the Puppet configuration tool

Automation is part of life in the data center, and Puppet is commonly regarded as the King of the Hill, but some users prefer the lean alternative Ansible.
Lead Image © Wayne Daniels, 123RF.com

Lead Image © Wayne Daniels, 123RF.com

Web-based reconnaissance

The recon-ng web reconnaissance framework is an important tool in penetration testing.
Lead Image © maridav, 123RF.com

Lead Image © maridav, 123RF.com

The SDFS deduplicating filesystem

Deduplicating filesystems like SDFS store redundant data, such as that created by backups, only once, thereby saving valuable disk space. Additionally, the filesystem can distribute the data to be stored across multiple computer nodes.
Lead Image © Raman Maisei, 123RF.com

Lead Image © Raman Maisei, 123RF.com

Develop your own scripts for Nmap

Nmap does a great job with standard penetration testing tasks, but for specific security analyses, you will want to develop your own test scripts. The Nmap Scripting Engine makes this possible.
Lead Image © Galina Peshkova, 123RF.com

Lead Image © Galina Peshkova, 123RF.com

Setting up Google Apps for Work

We show how to set up Google Apps for Work and how to configure them for company use.
Lead Image © Heiko Küverling, 123RF.com

Lead Image © Heiko Küverling, 123RF.com

Using the MQTT IoT protocol for unusual but useful purposes

Although the MQTT protocol is usually associated with the Internet of Things, it also works in some very different situations, such as monitoring, for example.