Articles

Lead Image Photo by Simeon Jacobson on Unsplash

Lead Image Photo by Simeon Jacobson on Unsplash

Improved defense through pen testing

Discover indicators of compromise with open source pen testing tools.
Photo by Damon Lam on Unsplash

Photo by Damon Lam on Unsplash

Open source multipoint VPN with VyOS

The VyOS Linux distribution puts network routing, firewall, and VPN functionality together and presents a fully working dynamic multipoint VPN router as an alternative or addition to a Cisco DMVPN mesh.
Lead Image © Kheng Ho Toh, 123rf.com

Lead Image © Kheng Ho Toh, 123rf.com

Optimization and standardization of PowerShell scripts

When PowerShell one-liners become full-blown scripts that have an effect throughout the enterprise, IT managers need to review their software development strategies. We look at PowerShell best practices for script design, notation, error handling, and documentation.
Lead Image © Lucy Baldwin, 123RF.com

Lead Image © Lucy Baldwin, 123RF.com

Assess USB performance while exploring storage caching

Use dd fluently to compare disk performance.
Lead Image © Andrea De Martin, 123RF.com

Lead Image © Andrea De Martin, 123RF.com

Workflow-based data analysis with KNIME

They say data is "the new oil," but all that data you collect is only valuable if it leads to new insights. An open source analysis tool called KNIME lets you analyze data through graphical workflows – without the need for programming or complex spreadsheet manipulation.

D-Wave's Murray Thom discusses the present and future of quantum computing.

Quantum computing used to be an esoteric thought experiment for theoretical physicists, but now it is actually starting to happen. We spoke with Murray Thom of D-Wave, a company that is leading the way to this radical new vision.
Lead Image © Leo Blanchette, 123RF.com

Lead Image © Leo Blanchette, 123RF.com

Installing and operating the Graylog SIEM solution

Graylog security information and event management combines real-time monitoring and immediate notification of rule violations with long-term archiving for analysis and reporting.
Lead Image © Andre Zhak, 123RF.com

Lead Image © Andre Zhak, 123RF.com

Debugging Bash scripts automatically

We look at various extension frameworks that make the life of developers and administrators easier when debugging a script.
Lead Image © yewkeo, 123RF.com

Lead Image © yewkeo, 123RF.com

Exploring SQL Server on Linux

SQL Server runs on Linux now. We'll show you how Microsoft developers made their massive database system Linux ready, and we'll help you get started with setting up SQL Server on your own Linux system.
Lead Image Photo by Ricardo Resende on Unsplash

Lead Image Photo by Ricardo Resende on Unsplash

Sharing threat information with MISP

The Malware Information Sharing Platform lets you record and document security incidents – and share the information with users on other networks.