17%
10.06.2015
Active Directory infrastructure, and show how powerful the system is in conjunction with well-known software-as-a-service (SaaS) offerings – all of which will provide the overall picture needed ... Azure Active Directory from Microsoft provides advanced, centralized authentication in the cloud. We show what this powerful system can do.
17%
03.02.2022
of the option to automate the setup and configuration of hard drive encryption.
This is where PowerShell comes into play. Microsoft provides command-line tools and matching cmdlets in the form of manage ... BitLocker provides current Windows versions a good, closely integrated encryption solution and lets you manage and maintain this feature with PowerShell.
17%
09.01.2013
applications. The mechanisms known on FreeBSD (chroot or jails) are not really an answer.
One remedy is to lock applications up in a sandbox, an environment that provides only very limited resources. However ... Applications such as web browsers can open up vulnerabilities and threaten an entire system. As a remedy, Capsicum provides the option of finely granulated allocation of privileges on top
17%
01.06.2024
records the share of involuntary waits that occur, for example, if you are looking at a virtual machine and the hypervisor distributes CPU time differently. Finally, idle provides information about time ... The top, vmstat, and iotop monitoring tools for Linux show the current situation but do not provide any information about the past – which is where sysstat comes into play.
17%
21.08.2014
's feature set not only to query status information but also to create new systems or define other virtual resources, such as networks.
On Fedora systems, the Python bindings are provided by the libvirt ... If you do not want to use any of the major management frameworks to manage your virtual machines, the Libvirt library for Python provides an alternative.
17%
20.05.2014
-known wildcards to provide greater tolerance. Thus, the above pattern could look like this:
pattern=Failed password for (\w+)
Now SEC alerts for each failed SSH login, because the \W+ regex stands for one or more ... The Simple Event Correlator is a small Perl program that supports analysis of logfiles with a view to security. In this article, we provide an introduction to SEC's rules and actions.
17%
17.07.2018
Approach
The classic approach is to install the services needed on central servers (see the "Deep Infrastructure" box), provide them with the corresponding configuration files, and operate them ... GitLab provides the perfect environment for generating Docker containers that can help you operate critical infrastructure reliably and reproducibly.
17%
13.02.2017
IT environments comfortably, openITCOCKPIT offers service template groups. As a result, identical hosts do not need to be provided manually with the same checks. To accomplish this, you create a new service ... A good monitoring solution must provide information about applications and their performance. We show you how to monitor a database using openITCOCKPIT.
17%
06.12.2011
Our ADMIN Update newsletter provides tips and practical solutions for configuration, security, and system management in heterogeneous environments.
Register for ADMIN Update!
17%
20.03.2014
Partition alignment changes as drives evolve, and proper alignment is necessary for maximum performance. We provide some tips to help you get things back in order.