Articles

Lead Image © Steven Cukrov, 123rf.com

Lead Image © Steven Cukrov, 123rf.com

Link aggregation with kernel bonding and the Team daemon

The Linux world has different implementations for integrating multiple network cards: kernel old-timer ifenslave and the younger libteam.
Photo by Damon Lam on Unsplash

Photo by Damon Lam on Unsplash

Open source multipoint VPN with VyOS

The VyOS Linux distribution puts network routing, firewall, and VPN functionality together and presents a fully working dynamic multipoint VPN router as an alternative or addition to a Cisco DMVPN mesh.
Lead Image © mikdam, 123RF.com

Lead Image © mikdam, 123RF.com

Preparing to move to the cloud

Because the cloud is ubiquitous, some companies think that outsourcing their business applications to Amazon, Google, and the like is a breeze. In fact, on the way, treacherous winds blow just off the beaten track.
Lead Image © Mykola Velychko, Fotolia.com

Lead Image © Mykola Velychko, Fotolia.com

Focusing on security in Active Directory

To prevent an intruder attack in Active Directory, Windows Server's security features along with freeware monitoring can save the day.
Photo by Quino Al on Unsplash

Photo by Quino Al on Unsplash

Analyzing tricky database problems

Database administrators at the Swiss foundation Switch were increasingly encountering corrupt data, which prompted a painstaking bug hunt. The solution they found increased performance by a factor of six.
Lead Image © abidal, 123rf.com

Lead Image © abidal, 123rf.com

Integrating scripts into Group Policy

Incorporating scripts into Group Policy can make a sys admin's job much easier.
Lead Image © Dmytro Demianenko, 123RF.com

Lead Image © Dmytro Demianenko, 123RF.com

Dialing up security for Docker containers

Docker containers are a convenient way to run almost any service, but admins need to be aware of the need to address some important security issues.
Photo by Joshua Earle on Unsplash

Photo by Joshua Earle on Unsplash

Monitoring and service discovery with Consul

When dozens of new services and VMs emerge and disappear every day in dynamic cloud environments, conventional monitoring provides false alarms, not operational security.
Lead Image © Kirsty Pargeter, 123RF.com

Lead Image © Kirsty Pargeter, 123RF.com

Optimizing Windows Server 2016 performance

With Windows Server 2016, tweaking the settings and taking advantage of performance monitoring tools can help boost your system's performance.
Photo by Geran de Klerk on Unsplash

Photo by Geran de Klerk on Unsplash

Detecting security threats with Apache Spot

Security vulnerabilities often remain unknown when the data they reveal is buried in the depths of logfiles. Apache Spot uses big data and machine learning technologies to sniff out known and unknown IT security threats.