Articles

Photo by Clay LeConey on Unsplash

Photo by Clay LeConey on Unsplash

Getting started with Prometheus

Prometheus is a centralized time series database with metrics, scraping, and alerting logic built in. We help you get started monitoring with Prometheus.
Lead Image © bluebay, 123rf.com

Lead Image © bluebay, 123rf.com

Hunt down vulnerabilities with the Metasploit pen-testing tool

The veteran Metasploit is by no means obsolete and is still used as a typical workflow to find and analyze security vulnerabilities in Windows 10 and Linux systems.
Photo by Muneeb Syed on Unsplash

Photo by Muneeb Syed on Unsplash

Use Linux Containers with WSL2 on Windows

Deploy a full Linux container environment, including a Kubernetes cluster, on Windows with Windows Subsystem for Linux version 2.
Lead Image © Victor Zastolskiy, 123RF.com

Lead Image © Victor Zastolskiy, 123RF.com

Run applications in a containerized sandbox with Firejail

Isolate popular applications in flexible, easy-to-set-up, and easy-to-take-down containers with Firejail.
Photo by Andrea Davis on Unsplash

Photo by Andrea Davis on Unsplash

Nested Kubernetes with Loft

Kubernetes has limited support for multitenancy, so many admins prefer to build multiple standalone Kubernetes clusters that eat up resources and complicate management. As a solution, Loft launches any number of clusters within the same control plane.
Lead Image © Cornelius, Fotolia.com

Lead Image © Cornelius, Fotolia.com

Linux apps on Windows 10 and Chrome OS

Microsoft and Google have upgraded their in-house operating systems, Windows 10 and Chrome OS, with subsystems to run Linux. We look into their highly different approaches.
Lead Image © bowie15 , 123RF.com

Lead Image © bowie15 , 123RF.com

Docker and Podman environments on Windows and Mac machines

Develop container applications on a Windows or Mac system with Docker Desktop or Podman.
Lead Image © Amy Walters, 123RF.com

Lead Image © Amy Walters, 123RF.com

Hardening network services with DNS

The Domain Name System, in addition to assigning IP addresses, lets you protect the network communication of servers in a domain. DNS offers further hardening of network protocols – in particular, SSH fingerprinting and CAA records.
Photo by Filip Mroz on Unsplash

Photo by Filip Mroz on Unsplash

Bpytop command-line monitoring tool

The bpytop command-line monitoring tool provides a variety of information via a fancy user interface and supports network monitoring and mouse- or keyboard-based control.
Photo by Pawel Nolbert on Unsplash

Photo by Pawel Nolbert on Unsplash

Multicloud management with Ansible

Remain independent of your cloud provider by automatically rolling out virtual machines and applications with Ansible neutral inventory files.