Advanced search


Sophisticated Heist  

A method known as Kerberoasting is an exploitation technique of the Kerberos authentication protocol. We take a closer look at the available safeguards and detection measures against this attack.

Unboxing  

Already mandatory in the United States and recently approved in Europe thanks to new legislation, a software bill of materials provides information about software components, enabling IT managers to respond better to attacks and vulnerabilities.

Automatic  

Construct Kubernetes clusters from the Azure CLI in a consistent and predictable manner across every environment.

Load Carrier  

Setting up and making the most of network load balancing on Windows Server 2019 and 2022.

Power Duo  

This comprehensive guide shows you how to merge the cross-platform capabilities of Ansible with PowerShell's robust Windows management features.

Gardening  

Your Active Directory system doesn't have to be a walled garden. A few easy steps are all you need to integrate Linux with AD.

Reconciled  

If you are running PHP applications, setting up HTTP/2 on the Apache HTTP Server can be a bit confusing because of some incompatibilities between the Apache HTTP/2 module and the Prefork multiprocessing module.