Articles

Photo by Alexander Grey on Unsplash

Photo by Alexander Grey on Unsplash

Encrypting DNS traffic on Linux with DoT

Prevent attackers from spying on DNS communication or manipulating responses by encrypting your DNS traffic on Linux with the DNS-over-TLS standard and the help of systemd-resolved.
Lead Image © Maxim Basinski, 123RF.com

Lead Image © Maxim Basinski, 123RF.com

Artificial admin

AIOps brings artificial intelligence tools into everyday administrative work, with AI-supported automation of some admin responsibilities.
Photo by Claudio Schwarz on Unsplash

Photo by Claudio Schwarz on Unsplash

RFID technologies and risks

We look at various approaches to RFID asset tracking, provide an understanding of the technologies and challenges involved, and cover some of the potential attack vectors.
Lead Image © Akurhan, 123RF.com

Lead Image © Akurhan, 123RF.com

Manage software apps publicly and privately

The WinGet client for the Windows Package Manager improves the software installation experience for administrators, developers, and users and provides a way to create and share software in the WinGet package format for publishing to public and private repos.
Lead Image © lexandersikovl, 123RF.com

Lead Image © lexandersikovl, 123RF.com

Chatbots put to the scripting test

The AI skillset is currently limited, so you don't yet have to worry about AI replacing programmers. We look at the capabilities of AI scripting with free large language models and where it works best.
Lead Image © grafner, 123RF.com

Lead Image © grafner, 123RF.com

Simple, small-scale Kubernetes distributions for the edge

We look at three scaled-down, compact Kubernetes distributions for operation on edge devices or in small branch office environments.
Photo by John Cameron on Unsplash

Photo by John Cameron on Unsplash

Fight Windows ransomware with on-board tools

Ransomware defense involves two strategies: identifying attacks and slowing the attackers to mitigate their effects.
Lead Image © limbi007, 123RF.com

Lead Image © limbi007, 123RF.com

Secure Kubernetes with Kubescape

Kubescape checks Kubernetes container setups for security and compliance issues, making life easier for administrators.
Lead Image © Aleksey Mnogosmyslov, 123RF.com

Lead Image © Aleksey Mnogosmyslov, 123RF.com

DevSecOps with DefectDojo

The DefectDojo vulnerability management tool helps development teams and admins identify, track, and fix vulnerabilities early in the software development process.
Photo by Stoochi Lam on Unsplash

Photo by Stoochi Lam on Unsplash

Centralized monitoring and intrusion detection

Security Onion bundles numerous individual Linux tools that help you monitor networks or fend off attacks to create a standardized platform for securing IT environments.