Advanced search


Emergency Response  

Sys admins turn to rescue systems when faced with difficulties. Four alternatives – Grml, Rescatux, Knoppix, and SystemRescueCd – show what they can do.

Hunting the Invisible  

Virtual networks and server structures require additional mechanisms to ensure visibility of data streams. We show how to monitor and analyze network functions, even when virtualization is involved.

Solid Defense  

Although attacks on computers are numerous and varied, they are predominantly based on the same techniques. Microsoft closes these vulnerabilities on Windows computers using the Enhanced Mitigation Experience Toolkit (EMET).

Scrutinized  

The OpenBSD origins of the OpenSMTPD mail transfer agent makes SMTP easier to implement and manage and more secure.

Simple Continuous Operation  

Oracle offers several approaches to creating a high-availability environment. We look at the Standard Edition and some of the associated drawbacks to achieving this goal.

Data Panda  

The Python Data Analysis Library, or Pandas, is built on top of the fast math library NumPy and makes analysis of large volumes of data an easy and efficient experience.

Large Radius  

Tired of contending with shared passwords for wireless networks? Use WPA Enterprise and a FreeRADIUS server to set up a user password solution for wireless users.

On Patrol  

You can strengthen your web security by testing for common vulnerabilities. We show how to do this using the attack proxy known as Burp Suite.

Secret Agent's Suitcase  

Event-based request processing makes Nginx an agile web server. With the OpenResty packages, it becomes a fast application server based on the Lua scripting language.

In the Vault  

Modern ATA hard drives and SSDs offer security options that help you control access and reliably destroy data if necessary.
Powered by eZ Publish™ CMS Open Source Web Content Management. Copyright © 1999-2014 eZ Systems AS (except where otherwise noted). All rights reserved.