Articles

Secure passwordless logins with FIDO2 and LDAP

Log in to your account securely without a password with LDAP and a schema to establish the objects and attributes required for FIDO2 authentication.
Photo by Nick Fewings on Unsplash

Photo by Nick Fewings on Unsplash

Integrating Podman and systemd

With the integration of Podman and systemd, you can put any software inside a container under the control of systemd and see almost no difference between running the service directly on the host or inside a container.
Photo by Wynand van Poortvliet on unsplash

Photo by Wynand van Poortvliet on unsplash

Grafana and Prometheus customized dashboards

Grafana analytics and visualization dashboards plus the Prometheus monitoring and alerting tool make possible extensive custom reporting and alerting systems.
Photo by Dane Deaner on Unsplash

Photo by Dane Deaner on Unsplash

Reducing the Windows 10 attack surface

Windows attack surface reduction policies make significant progress in protecting your entire IT infrastructure.

Photo by Jan Schulz # Webdesigner Stuttgart

Cloud-native storage with OpenEBS

Software from the open source OpenEBS project provides a cloud-native storage environment that makes block devices available to individual nodes in the Kubernetes cluster.
Photo by Patrick Schneider on Unsplash

Photo by Patrick Schneider on Unsplash

Kafka: Scaling producers and consumers

A guide to 10x scaling in Kafka with real-world metrics for high throughput, low latency, and cross-geographic data movement.

Harden your Apache web server

Cyberattacks don't stop at the time-honored Apache HTTP server, but a smart configuration, timely updates, and carefully considered security strategies can keep it from going under.
Lead Image © ginasanders, 123RF.com

Lead Image © ginasanders, 123RF.com

Protect privileged accounts in AD

Granular protection for highly privileged accounts is granted by the Protected Users group in Active Directory and Kerberos authentication policies.
Lead Image © Yewkeo, 123RF.com

Lead Image © Yewkeo, 123RF.com

Endlessh and tc tarpits slow down attackers

Keep an attacker's connections open in an Endlessh "tarpit" or delay incoming connections with the more traditional rate-limiting approach of tc.
Lead Image © zelfit, 123RF.com

Lead Image © zelfit, 123RF.com

MinIO: Amazon S3 competition

MinIO promises no less than a local object store with a world-class S3 interface and features that even the original lacks.