Forensic Tools

Criminals often focus on browsers for various attacks because they are a worthwhile, attractive, and often easy target. However, admins can investigate such attacks with forensic tools that provide the ability to reconstruct browser sessions.

What’s New in Microsoft Windows 8.1

With Windows 8.1, Microsoft tries to correct the mistakes made in Windows 8 that are still keeping users and companies from using the new operating system. Besides the half-hearted revival of the Start button and the ability to boot directly into the desktop, it includes some interesting features.

Integrating AWS Cloud Services with Your Custom Apps

The Boto Python module helps admins manage resources in the Amazon Cloud. We introduce you to the tool.

Data Visualization Tools

Logfiles contain extremely useful traces of everyday events – if only they weren’t so boring. Fortunately, special tools help you generate and even animate colorful, easily interpretable graphics.

Using rsync for Backups

Although commercial Linux backup tools are available, many people prefer open source to better understand and control the backup process. One open source tool that can do both full and incremental backups is rsync.

Build a Network Attached Storage System with FreeNAS

We provide an overview of FreeNAS and ZFS, its main filesystem, then show you how to set up and maintain a FreeNAS installation.

A Management Platform for the Internet of Things

The Internet of Things is predicted to be a huge market in the next 10 years, taking the dumb objects around us and making them data-noisy.

Web Cryptography API

The controversial Web Cryptography API offers flexible encryption for web applications, but it also lays the groundwork for content providers to implement more powerful access restrictions through DRM.

Free Enterprise Backup with Bareos

Available on almost all platforms, the open source backup software Bacula is popular with many administrators – now the Bareos fork is poised to expand its leading role.

Denial of Service in the Cloud

In some particularly sophisticated DDoS attacks, the attackers rely on and target the cloud, which allows them to work around conventional defense mechanisms. We explain how a DDoS attack in the cloud works, and how you can defend against it.