Advanced search
Search all the words
Search the exact phrase
Published
Any time
Last day
Last week
Last month
Last three months
Last year
Display per page
5 items
10 items
20 items
30 items
50 items
Search for "" returned 4528 matches
Welcome
123RF_173770910_Ship_Wheel_Kubernetes_OksanaStepanenko_resized.png
For all the fear, uncertainty, and doubt still surrounding cloud technologies, you must take a level of acceptable risk to move forward.
Robots in the Data Center
PhotobyBrianMcGowanonUnsplash_Robots.png
Numerous tools are available to manage the hard drive inventory of Windows servers, but they fall short when it comes to comprehensive automation, which is where PowerShell can help.
Confidential Game
PhotobysaeedkarimionUnsplash_Secret.png
Now that web content is encrypted by HTTPS, the underlying name resolution is often unprotected. We look at the classic DNS protocol and investigate whether DNS over HTTPS could be the solution to ensure the confidentiality of DNS requests.
Ready, Steady, …
PhotobyBradenCollumonUnsplash_Race.png
United States Cybersecurity Maturity Model Certification will be required by mid-2023 to handle controlled unclassified information and win federal contracts, but it can also help minimize business risk and keep information out of the hands of adversaries.
Speed in the Tunnel
PhotobyMarcSendraMartorellonUnsplash_Tunnel-Lights.png
SoftEther is lean VPN software that outpaces the current king of the hill, OpenVPN, in terms of technology and performance.
Tech News
OpenSSL has issued an advisory (https://www.openssl.org/news/secadv/20221101.txt) relating to two vulnerabilities (CVE-2022-3602 and CVE-2022-3786), which affect OpenSSL version 3.0.0.
Plan B
123RF_140134742_Arrows_elnur_resized.png
OpenStack is considered the industry standard for building private clouds, but the solution is still far too complex and too difficult to maintain and operate for many applications. What causes OpenStack projects to fail, and what alternatives do administrators have?
Open House
PhotobyAlistairMacRobertonUnsplash_Open-Window.png
Several tactics, techniques, and procedures circulating among cybercriminals exploit Windows Subsystem for Linux as a gateway. We look at how WSL can be misused and some appropriate protections.
Maturity Processes
PhotobyJulienDIMAJOonUnsplash_clouds.png
OpenStack has been on the market for 12 years and is generally considered one of the great open source projects. Thierry Carrez and Jeremy Stanley both work on the software and provide information about problems, innovations, and future plans.
Spoiled for Choice
PhotobyRobertAnaschonUnsplash_Doors.png
We look at the role of identity and access management in midmarket organizations.
« Previous
Next »
1
...
301
302
303
304
305
306
307
308
309
310
311
312
313
314
...
453
Powered by
eZ Publish™ CMS Open Source Web Content Management
. Copyright © 1999-2014
eZ Systems AS
(except where otherwise noted). All rights reserved.