Articles

Photo by Jorge Fernández Salas on Unsplash

Photo by Jorge Fernández Salas on Unsplash

Best practices for secure script programming

The lax syntax verification of shell scripts and a lack of attention to detail in programming can create impressively dangerous security vulnerabilities.
Photo by Bee Felten-Leidel on Unsplash

Photo by Bee Felten-Leidel on Unsplash

Tinkerbell life-cycle management

Tinkerbell specializes in bare metal deployment and life-cycle management, allowing intervention in every phase of the setup.
Photo by Markus Spiske on Unsplash

Photo by Markus Spiske on Unsplash

Fast and scalable ownCloud Infinite Scale

A complete rebuild of ownCloud delivers the speedy and scalable ownCloud Infinite Scale file platform.
Lead Image © ximagination, fotolia.com

Lead Image © ximagination, fotolia.com

Back up virtual machines and clusters

Vembu BDR Suite provides comprehensive software that supports flexible configuration when backing up virtual production operations.
Lead Image © Zlatko Guzmic, 123RF.com

Lead Image © Zlatko Guzmic, 123RF.com

Kubernetes clusters within AWS EKS

Automated deployment of the AWS-managed Kubernetes service EKS helps you run a production Kubernetes cluster in the cloud with ease.
Photo by Art Lasovsky on Unsplash

Photo by Art Lasovsky on Unsplash

Self-signed certificates with Jenkins

Convince Jenkins as a Docker container to recognize self-signed certificates, verify that the instance is connecting to the correct online service, and that your traffic is transmitted in an encrypted format.
Lead Image © Vladimir Nenov, 123RF.com

Lead Image © Vladimir Nenov, 123RF.com

Unleashing Accelerated Speeds with RAM Drives

Enable and share performant block devices across a network of compute nodes with the RapidDisk kernel RAM drive module.
Lead Image © Tomasz Pacyna, 123RF.com

Lead Image © Tomasz Pacyna, 123RF.com

Forensic analysis with Autopsy and Sleuth Kit

Forensic admins can use the Autopsy digital forensics platform to perform an initial analysis of a failed system, looking for traces of a potential attack.
Lead Image © Kirsty Pargeter, Fotolia.com

Lead Image © Kirsty Pargeter, Fotolia.com

Run Kubernetes in a container with Kind

Create a full-blown Kubernetes cluster in a Docker container with just one command.
Photo by Kelly Sikkema on Unsplash

Photo by Kelly Sikkema on Unsplash

Manage Windows AD with PowerShell

PowerShell helpers let you automate searches in Active Directory and secure critical accounts.