Articles

Photo by Damien TUPINIER on Unsplash

Photo by Damien TUPINIER on Unsplash

Load testing with Locust

The Locust load test tool assesses the resiliency of your infrastructure to help you determine whether it can withstand a flood of requests.
Photo by Claudia Soraya on Unsplash

Photo by Claudia Soraya on Unsplash

Remote maintenance and automation with RPort

Firewalls and network address translation often stand in the way of access to remote systems, but the free RPort software works around these obstacles and supports remote maintenance through a tunnel locally, in the cloud, and from your home office.
Lead Image © Lucy Baldwin, 123RF.com

Lead Image © Lucy Baldwin, 123RF.com

Comparing startup times of Linux distros in the cloud

A cloud speed test pits Linux distributions against one another.
Photo by Ilya lix on Unsplash

Photo by Ilya lix on Unsplash

Configuring X Window input and output devices

Two command-line tools, xandr and xinput, let you optimize your X Window display from the terminal.
Photo by Lucas Gallone on Unsplash

Photo by Lucas Gallone on Unsplash

Three full-text desktop search engines

Desktop search engines such as Tracker, DocFetcher, and Recoll help track down files by their content, even in massive datasets.
Lead Image © Lucy Baldwin, 123RF.com

Lead Image © Lucy Baldwin, 123RF.com

Stretching devices with limited resources

Compressed memory solutions for small memory problems.
Lead Image © Galina Peshkova, 123RF.com

Lead Image © Galina Peshkova, 123RF.com

Endpoint Security for Windows 10

Windows 10, build 21H1, has numerous protection mechanisms out of the box. We look at the option for delaying updates, the components and features of Microsoft Defender, and recommendations for hardening the operating system.
Lead Image © SOMYOT TECHAPUWAPAT , 123RF.com

Lead Image © SOMYOT TECHAPUWAPAT , 123RF.com

Portable home directory with state-of-the-art security

The systemd Homed service makes it easy to move your home directory, and FIDO2 or PKCS#11 can secure the stored files.
Photo by nikko osaka on Unsplash

Photo by nikko osaka on Unsplash

Keeping container updates under control

Some application developers try to handle containerized applications as if they were conventional monoliths, but managing updates and security patches in containers needs a totally different approach.
Lead Image © Stuart Miles, 123RF.com

Lead Image © Stuart Miles, 123RF.com

Obtain certificates with acme.sh

We take a close look at acme.sh, a lightweight client for the ACME protocol that facilitates digital certificates for secure TLS communication channels.