If your database is so important that the content must not be lost between periodic data backups, replication is a possible solution. We describe how to set up replication for MariaDB with the aid of XtraBackup.
Docker containers introduce serious security problems, but you can employ a number of methods to deploy them securely.
Watering hole and spear phishing targeted attacks offer the greatest rewards to cybercriminals. Here's how to protect your company from these types of attacks.
The free Amanda backup utility dates back to the days of tape drives, but it is still a powerful tool for centralized backup across the network.
Service Pack 1 for Exchange 2013 introduced a new protocol, which has become the default in Exchange 2016: MAPI over HTTP.
Security, deployment, and updates for thousands of nodes prove challenging in practice, but with CoreOS and Kubernetes, you can orchestrate container-based web applications in large landscapes.
The release of Windows Server 2016 also heralds a new version of Hyper-V, with improved cloud security, flexible virtual hardware, rolling upgrades of Hyper-V clusters, and production checkpoints.
Automatically create restrictive rules in Linux iptables packet filters.
Much has happened in the field of SELinux in the last few years, including the development of new usability features. The current release makes it easier to write SELinux policy modules yourself.
Chef administrators unafraid of a learning curve can employ a powerful tool for Windows client management. Teamed with PowerShell, it offers more than some system management suites.
12.04 LTS 16 cores 8 cores AMD AMD-V ARB ARSC Active Directory Administration Amazon AWS Amazon CloudFront Anaconda Analytics Apache Apache Deltacloud Apache benchmarking tool Architecture Review Board Archiving ab acquisition alert amazon analysis analysis application performance arp cache poisoning arpspoof article submission astrophysics