Articles

Well-Tempered Computer  

Windows 10, build 21H1, has numerous protection mechanisms out of the box. We look at the option for delaying updates, the components and features of Microsoft Defender, and recommendations for hardening the operating system.

Fewer Memories  

Compressed memory solutions for small memory problems.

Tailor-Made  

Two command-line tools, xandr and xinput, let you optimize your X Window display from the terminal.

For Young and Old  

Develop container applications on a Windows or Mac system with Docker Desktop or Podman.

Defenders  

The Domain Name System, in addition to assigning IP addresses, lets you protect the network communication of servers in a domain. DNS offers further hardening of network protocols – in particular, SSH fingerprinting and CAA records.

Convenience  

The bpytop command-line monitoring tool provides a variety of information via a fancy user interface and supports network monitoring and mouse- or keyboard-based control.

Locked In  

Isolate popular applications in flexible, easy-to-set-up, and easy-to-take-down containers with Firejail.

Matryoshka  

Kubernetes has limited support for multitenancy, so many admins prefer to build multiple standalone Kubernetes clusters that eat up resources and complicate management. As a solution, Loft launches any number of clusters within the same control plane.

Penguin Travel  

Microsoft and Google have upgraded their in-house operating systems, Windows 10 and Chrome OS, with subsystems to run Linux. We look into their highly different approaches.

Security Tools  

The veteran Metasploit is by no means obsolete and is still used as a typical workflow to find and analyze security vulnerabilities in Windows 10 and Linux systems.