Articles
Professional protection for small and mid-size enterprises
To what extent does the Untangle NG Firewall, where apps come together like pieces of a jigsaw, meet customer criteria for protection, usability, price, and support?
Shadow admin permissions and your AWS account
Malicious attackers are trying to conquer your AWS castle in the cloud. To mount a strong defense, you'll need a deeper understanding of privilege escalation and shadow admin permissions.
Finding Your Way Around a GPU-Accelerated Cloud Environment
We look at the tools needed to discover, configure, and monitor an accelerated cloud instance, employing the simplest possible tool to get the job done.
Storage protocols for block, file, and object storage
The future of flexible, performant, and highly available storage.
Protect Hyper-V with on-board resources
With the right settings and small tools, security in virtual environments can be increased significantly by tweaking the on-board tools.
Pattern matching dispute in Python 3.10
A controversial change is taking place in Python version 3.10 known mainly from functional languages: pattern matching.
Advanced MySQL security tips (a complete guide)
Security safeguards protect data on MySQL servers.
Save sudo logs on a remote computer
One of the new features implemented in the current 1.9 version of the sudo tool is the ability to save sudo logs locally and on a remote computer.
Controlled container communication
Tune the iptables configuration for Docker by establishing your own forwarding rules.
Ransomware: Prepare for emergencies
The danger of ransomware attacks calls for a robust backup and monitoring strategy.
Topics
12.04 LTS
16 cores
8 cores
AI
AMD
AMD-V
AMI
Active Directory
Administration
Amazon AWS
Amazon CloudFront
Amazon Machine Images
Anaconda
Analytics
Ansible
Apache
Apache Deltacloud
Apache benchmarking tool
ab
acceleration
acquisition
admin tools
agedu
alert
amazon
analysis
analysis
anticipatory
application performance