Articles

Photo by Nils Bouillard on Unsplash

Photo by Nils Bouillard on Unsplash

Flexible backup for large-scale environments

Bacula is a powerful open source backup solution for large environments that offers automation, extension modules, and commercial support.
Photo by redcharlie on Unsplash

Photo by redcharlie on Unsplash

Supercharge your software upgrade routine

Topgrade steps forward as the hero to help you keep an upper hand over updating and upgrading your stable of Linux applications.
Lead Image © Konstantin Shaklein, 123RF.com

Lead Image © Konstantin Shaklein, 123RF.com

Managing infrastructure as code with Spacelift

The Spacelift infrastructure-as-code management platform quickly rolls out complete setups to the cloud, minimizing the possibility of failure and problems.
Photo by Cécile Brasseur on Unsplash

Photo by Cécile Brasseur on Unsplash

Managing GPT-4 on the Network

Now that Microsoft has integrated its GPT-4-based AI chat functions directly into the operating system with Windows Copilot, which now includes Bing Chat and Bing Chat Enterprise, you might want to know how to control or even block its use on the network.
Lead Image © balein, 123RF.com

Lead Image © balein, 123RF.com

Kubernetes networking in the kernel

Cilium and eBPF put Kubernetes networking down in the kernel where it belongs.
Lead Image © Tjefferson, Fotolia.com

Lead Image © Tjefferson, Fotolia.com

Security and automation with SBOMs

Already mandatory in the United States and recently approved in Europe thanks to new legislation, a software bill of materials provides information about software components, enabling IT managers to respond better to attacks and vulnerabilities.
Lead Image © Levente Janos, 123RF.com

Lead Image © Levente Janos, 123RF.com

Admin as a service with sysstat for ex-post monitoring

The top, vmstat, and iotop monitoring tools for Linux show the current situation but do not provide any information about the past – which is where sysstat comes into play.
Lead Image © zeferli, 123RF.com

Lead Image © zeferli, 123RF.com

Securing the container environment

Implement a good, robust defense with an in-depth strategy of applying multiple layers of security to all components, including the human factor.
Lead Image © alphaspirit, 123RF.com

Lead Image © alphaspirit, 123RF.com

Making Kerberoasting uneconomical

A method known as Kerberoasting is an exploitation technique of the Kerberos authentication protocol. We take a closer look at the available safeguards and detection measures against this attack.
Photo by Alexander Grey on Unsplash

Photo by Alexander Grey on Unsplash

Encrypting DNS traffic on Linux with DoT

Prevent attackers from spying on DNS communication or manipulating responses by encrypting your DNS traffic on Linux with the DNS-over-TLS standard and the help of systemd-resolved.