Articles

SecurityX-Ray  

To ensure your servers and workstations are well protected against attacks on your network, you need a professional security scanner. In version 6, Tenable has substantially expanded its Nessus vulnerability scanner. We pointed the software at a number of test computers.

Assistance  

osTicket is a lean ticket system that limits itself to the core functions of receiving and processing requests.

Hidden Information  

Network information in virtualized computer landscapes is not easy to access. In this article, we look at a few approaches you can use.

Slippery Floor  

Even though corporations are looking to move to IPv6, in some situations networks still rely exclusively on IPv4. We discuss ways to minimize delays and unsatisfactory behavior in mixed IPv4/IPv6 IT environments.

RAID for the Network  

The Fault Tolerant Router daemon uses multipath routing among multiple Internet connections to keep you connected, even when some connections go down.

Shared storage systems GlusterFS and Ceph compared  

Many shared storage solutions are currently vying for users’ favor; however, Ceph and GlusterFS generate the most press. We compare the two competitors and reveal the strengths and weaknesses of each solution.

Storage Space  

Admins can solve typical mail server scalability problems with Dovecot’s Amazon S3 plugin and the Ceph distributed object store.

Watchful Dragon  

Thanks to its huge choice of security tools, Linux is perfectly suited to securing heterogeneous networks. With a specialized distro like Kali Linux, you can quickly locate and eliminate security vulnerabilities.

Hands-On Storage  

The LIO multiple-protocol SCSI target is perfectly suited for complex test environments, especially because of its support for SCSI standards across the board.

TCP Camouflage  

Port scans for finding vulnerable services are nothing new, and port knocking as a defense has been around for a while, too. TCP Stealth tries to do something similar, but it takes a more sophisticated approach. We take a closer look.