Articles

Canary in a Coal Mine  

The canary in a coal mine has made its way metaphorically into IT security with the OpenCanary honeypot for detecting attacks.

On the Safe Side  

Eliminate single points of failure and service downtime with the DRBD distributed replicated storage system and the Corosync and Pacemaker service.

Best-Laid Plans  

OpenProject supplies sensible, comprehensive project management for SMEs with few financial inputs.

Workers  

Discover the advantages and disadvantages of turning a bare metal system into the core of an antMan cloud and whether the free Community Edition and its limitations will work in your case.

Before the Wave  

Google Tsunami security scanner detects errors that typically signal danger and outputs alerts. We look into how you can get the tool up and running and even write the required plugins yourself.

Collector  

Security Onion offers a comprehensive security suite for intrusion detection that involves surprisingly little work.

Password Overboard!  

Passwords are becoming a thing of the past. We look into the basic weaknesses of passwords, explain what passkeys are all about, and assess their practicality.

No Entry  

Check your web servers for known vulnerabilities.

Inspired  

SPIFFE and SPIRE put strong workload identities at the center of a zero-trust architecture. They improve reliability and security by taking the responsibility for identity creation and management away from individual services and workloads.

Martial Arts  

Binary analysis is an advanced technique used to work through cyberattacks and malware infestations and is also known as reverse engineering. We show you how to statically analyze binary programs with Binary Ninja, an interactive binary analysis platform.