Nmap does a great job with standard penetration testing tasks, but for specific security analyses, you will want to develop your own test scripts. The Nmap Scripting Engine makes this possible.
We show how to set up Google Apps for Work and how to configure them for company use.
Although the MQTT protocol is usually associated with the Internet of Things, it also works in some very different situations, such as monitoring, for example.
OpenQRM is a web-based, open source, data center management and cloud platform that offers many popular Linux tools with no major configuration overhead. We show you how to use it.
The focus for container solutions such as Docker is increasingly shifting to security. Some vulnerabilities have been addressed, with plans to take further steps in the future to secure container virtualization.
The Magnum project brings Docker container technology to the OpenStack cloud.
We look at some common sense tips and open source tools for securing IoT devices.
Etcd, ZooKeeper, Consul, and similar programs are currently the subject of heated debate in the world of configuration management. We investigate the problems they seek to solve and promises they make.
We describe some basic considerations for choosing a Security Information and Event Management system and designing its implementation.
Although attacks on computers are numerous and varied, they are predominantly based on the same techniques. Microsoft closes these vulnerabilities on Windows computers using the Enhanced Mitigation Experience Toolkit (EMET).
12.04 LTS 16 cores 8 cores AMD AMD-V ARB ARSC Active Directory Administration Amazon AWS Amazon CloudFront Anaconda Analytics Apache Apache Deltacloud Apache benchmarking tool Architecture Review Board Archiving ab acquisition alert amazon analysis analysis application performance arp cache poisoning arpspoof article submission astrophysics