Articles

Eruption  

Volcano optimizes high-performance workloads on Kubernetes to avoid deadlocks.

Light at the End of the Tunnel  

We give you the ultimate guide to deploying a self-hosted Pritunl VPN server with multifactor authentication.

Contained  

Podman has become an attractive alternative to Docker, not least because it does not require a central daemon. In this article, we look at how to set about changing the guard and how you can use Podman Desktop to do so.

Production Line  

The bootc project lets you use a container-based workflow to create bootable operating system images. In a few simple steps, we show you how to use Podman to create ready-to-run images.

Tracker  

This traffic analysis software identifies malicious traffic on your network with the use of established sources.

Putting On the Brakes  

Slowloris can help you harden your web servers against denial-of-service attacks that restrict the availability of web services.

A Helping Hand  

OTOBO is a user-friendly and completely free ticket system designed to handle complex service requirements that offers an alternative, easy-to-use support tool with Active Directory integration and single sign-on. We show you how to set up and configure OTOBO and how to connect it to third-party systems such as Entra ID.

Spy Story  

The Tactical RMM open source tool offers a combination of remote monitoring and management, with agents to support Linux, macOS, and Windows.

Stow It!  

The GNU Stow tool in combination with Ansible can help you manage configuration files.

Secret Symbols  

Many rules for secure passwords pose major obstacles for unsuspecting users. We investigate how meaningful rigid guidelines are, restate how important passphrases and passkeys are becoming, and offer two recommendations for team-capable password management.
Powered by eZ Publish™ CMS Open Source Web Content Management. Copyright © 1999-2014 eZ Systems AS (except where otherwise noted). All rights reserved.