Articles

PowerShell add-on security modules

Numerous PowerShell add-on modules provide security and attack functions for penetration tests and forensic analyses, to help admins search for vulnerabilities in their networks.
Lead Image © Les Cunliffe, 123RF.com

Lead Image © Les Cunliffe, 123RF.com

Highly available storage virtualization

Implementing highly available SAN data storage virtualization.
Lead Image © golffoto, photocase.com

Lead Image © golffoto, photocase.com

Continuous upgrades for Windows 10

The new Windows 10 update strategy, called an in-place upgrade, requires some manual adjustments for third-party components, as well as accommodations for multilingual and non-English enterprises.
Lead Image © krisckam, 123RF.com

Lead Image © krisckam, 123RF.com

Desktops and applications with Essentials

Employees or individual teams who need a workstation quickly can benefit from XenApp Essentials and XenDesktop Essentials; those who need more extensive services can move to XenApp and XenDesktop Services.
Lead Image © Michal Bednarek, 123RF.com

Lead Image © Michal Bednarek, 123RF.com

Keeping the software in Docker containers up to date

Docker has radically changed the way admins roll out their software in many companies. However, regular updates are still needed. How does this work most effectively with containers?
Lead Image © Author, 123RF.com

Lead Image © Author, 123RF.com

Version 5.2 of the Ruby framework

Ruby on Rails 5.2 was released during RailsConf, which took place in Pittsburgh in mid-April 2018. Although not much has changed for old Rails applications, you'll find a few notable additions for new ones.
Lead Image by Alex Kotliarskyi on Unsplash

Lead Image by Alex Kotliarskyi on Unsplash

A REST API automation strategy for DevOps

Making resources available through REST APIs breaks down the automation silos that cater to the different IT and development environments and sets up an application-centric automation approach.
Photo by Braden Collum on Unsplash

Photo by Braden Collum on Unsplash

Alternative container runtimes thanks to the Open Container Initiative

Most users tend to think of Docker when they hear the word "containers," but for some time now it has been possible to operate containers with other runtimes. We take a closer look at Docker and the CRI-O project.
Lead Image © alexwhite, 123RF.com

Lead Image © alexwhite, 123RF.com

Many approaches help secure a web server

We submit an Apache web server to the Qualys SSL Server Test and look at how to protect against data theft with a combination of TLS by way of Let's Encrypt, SELinux or AppArmor, a firewall, and restraining your web server's verbosity.
Lead Image © Aleksey Mnogosmyslov, 123RF.com

Lead Image © Aleksey Mnogosmyslov, 123RF.com

Protecting documents with Azure Information Protection

Azure Information Protection helps businesses control how information in communications between employees is handled.