Articles

Lead Image © sandra zuerlein, fotolia.com

Lead Image © sandra zuerlein, fotolia.com

Halting the ransomware blackmail wave

In the tsunami of ransomware infections this year, the Locky encryption trojan is a high-water mark. With a constant stream of novel attack patterns, this continually evolving pest makes life difficult for IT managers, users, and security vendors. Here's how to protect yourself.
Lead Image © Kran Kanthawong, 123RF.com

Lead Image © Kran Kanthawong, 123RF.com

Setting up MariaDB replication with the help of XtraBackup

If your database is so important that the content must not be lost between periodic data backups, replication is a possible solution. We describe how to set up replication for MariaDB with the aid of XtraBackup.
Lead Image © Irina Tischenko, 123RF.com

Lead Image © Irina Tischenko, 123RF.com

Keeping Docker containers safe

Docker containers introduce serious security problems, but you can employ a number of methods to deploy them securely.
Lead Image © Ildar Galeev, 123RF.com

Lead Image © Ildar Galeev, 123RF.com

Targeted attacks on companies

Watering hole and spear phishing targeted attacks offer the greatest rewards to cybercriminals. Here's how to protect your company from these types of attacks.
Lead Image © Tommaso Lizzul, 123RF.com

Lead Image © Tommaso Lizzul, 123RF.com

Network backups with Amanda

The free Amanda backup utility dates back to the days of tape drives, but it is still a powerful tool for centralized backup across the network.
Lead Image © sermax55, 123RF.com

Lead Image © sermax55, 123RF.com

New Exchange standard

Service Pack 1 for Exchange 2013 introduced a new protocol, which has become the default in Exchange 2016: MAPI over HTTP.
Lead Image © cepixx, 123RF.com

Lead Image © cepixx, 123RF.com

Safeguard and scale containers

Security, deployment, and updates for thousands of nodes prove challenging in practice, but with CoreOS and Kubernetes, you can orchestrate container-based web applications in large landscapes.
Lead Image © scyther5, 123RF.com

Lead Image © scyther5, 123RF.com

Hyper-V containers with Windows Server 2016

The release of Windows Server 2016 also heralds a new version of Hyper-V, with improved cloud security, flexible virtual hardware, rolling upgrades of Hyper-V clusters, and production checkpoints.
Lead Image © french 03, photocase.com

Lead Image © french 03, photocase.com

A script for strict packet filter updates

Automatically create restrictive rules in Linux iptables packet filters.
Lead Image © Amy Walters, 123RF.com

Lead Image © Amy Walters, 123RF.com

Writing SELinux modules

Much has happened in the field of SELinux in the last few years, including the development of new usability features. The current release makes it easier to write SELinux policy modules yourself.