Articles

Photo by Artem Bryzgalov on Unsplash

Photo by Artem Bryzgalov on Unsplash

Attack and defense techniques

The MITRE ATT&CK and D3FEND knowledge databases provide useful techniques for securing your IT infrastructure.
Photo by Mohamed Shaffaf on Unsplash

Photo by Mohamed Shaffaf on Unsplash

New features in Windows Terminal Preview

Windows Terminal Preview comes with interesting new features, such as state-preserving quick windows access via shortcuts and configuration of almost all settings in a GUI, which is reason enough to take a look at the preview.
Lead Image © Sgursozlu, Fotolia.com

Lead Image © Sgursozlu, Fotolia.com

macOS file recovery and security

macOS on-board tools and third-party applications can help prevent the loss of files and make security and backup your first priority.
Photo by Soner Eker on Unsplash

Photo by Soner Eker on Unsplash

Detecting and analyzing man-in-the-middle attacks

Wireshark and a combination of tools comprehensively analyze your security architecture.
Photo by Glen Carrie on Unsplash

Photo by Glen Carrie on Unsplash

eSIMs in the enterprise

In this overview, we look at the opportunities eSIM technology offers for the mobile workplace and what IT managers need to watch out for in deployment and management.
Photo by Pablo Heimplatz on Unsplash

Photo by Pablo Heimplatz on Unsplash

Server update with Azure Update Management

Microsoft Azure Update Management automatically patches servers in on-premises data centers, virtual servers on Azure and other cloud services, and even Linux servers.
Lead Image © Olivier Le Moal, 123RF.com

Lead Image © Olivier Le Moal, 123RF.com

Secure SSH connections the right way

Admins use SSH, the proverbial Swiss army knife of system management, for many of their daily tasks, but no matter how powerful the tool might be, it typically does not offer adequate protection. We look at ways to tighten SSH security.
Photo by CHUTTERSNAP on Unsplash

Photo by CHUTTERSNAP on Unsplash

JMeter tests loads and measures performance of static and dynamic resources

The JMeter specialized integrated development environment applies test scripts for load testing and performance evaluation and supports various protocols that come in handy for Internet-powered applications.
Photo by Clay LeConey on Unsplash

Photo by Clay LeConey on Unsplash

Getting started with Prometheus

Prometheus is a centralized time series database with metrics, scraping, and alerting logic built in. We help you get started monitoring with Prometheus.
Lead Image © bluebay, 123rf.com

Lead Image © bluebay, 123rf.com

Hunt down vulnerabilities with the Metasploit pen-testing tool

The veteran Metasploit is by no means obsolete and is still used as a typical workflow to find and analyze security vulnerabilities in Windows 10 and Linux systems.