Articles

Lead Image © bowie15 , 123RF.com

Lead Image © bowie15 , 123RF.com

Docker and Podman environments on Windows and Mac machines

Develop container applications on a Windows or Mac system with Docker Desktop or Podman.
Lead Image © Amy Walters, 123RF.com

Lead Image © Amy Walters, 123RF.com

Hardening network services with DNS

The Domain Name System, in addition to assigning IP addresses, lets you protect the network communication of servers in a domain. DNS offers further hardening of network protocols – in particular, SSH fingerprinting and CAA records.
Photo by Filip Mroz on Unsplash

Photo by Filip Mroz on Unsplash

Bpytop command-line monitoring tool

The bpytop command-line monitoring tool provides a variety of information via a fancy user interface and supports network monitoring and mouse- or keyboard-based control.
Photo by Pawel Nolbert on Unsplash

Photo by Pawel Nolbert on Unsplash

Multicloud management with Ansible

Remain independent of your cloud provider by automatically rolling out virtual machines and applications with Ansible neutral inventory files.
Lead Image © Alexander Tkach, 123RF.com

Lead Image © Alexander Tkach, 123RF.com

QUMBU backup and maintenance tool for Microsoft SQL Server

QUMBU lets database administrators – even those with less experience – perform straightforward SQL Server backups and maintenance checks.

Zero-Ops Kubernetes with MicroK8s

A zero-ops installation of Kubernetes with MicroK8s operates on almost no compute capacity and roughly 700MB of RAM.
Photo by Jan Canty on Unsplash

Photo by Jan Canty on Unsplash

Security boundaries in Windows

We look at Microsoft security boundaries and protection goals and their interpretation of the different security areas of Windows operating systems and components.
Photo by Mac Gaither on Unsplash

Photo by Mac Gaither on Unsplash

OPA and Gatekeeper enforce policy defaults in Kubernetes

Enforce container compliance in Kubernetes in one of two ways: with Open Policy Agent or Gatekeeper.
Lead Image © Vlad Kochelaevskiy, Fotolia.com

Lead Image © Vlad Kochelaevskiy, Fotolia.com

Ergonomics and security of graphical email clients

We look at the ease of finding a way around current graphical email clients by investigating ergonomics, security, and extensibility.
Photo by Fré Sonneveld on Unsplash

Photo by Fré Sonneveld on Unsplash

Automate complex IT infrastructures with StackStorm

StackStorm is an open source, event-based platform for runbook automation.