Articles

Lead Image © Amy Walters, 123RF.com

Lead Image © Amy Walters, 123RF.com

Writing SELinux modules

Much has happened in the field of SELinux in the last few years, including the development of new usability features. The current release makes it easier to write SELinux policy modules yourself.
Lead Image © Brian Kenney, 123RF.com

Lead Image © Brian Kenney, 123RF.com

Exploring OpenStack's Trove DBaaS

DBaaS moves the database service to the cloud, promising a new database instance at the click of a mouse.
Lead Image © Tom Wang, 123RF.com

Lead Image © Tom Wang, 123RF.com

Proactive Monitoring

System administrators usually take action after monitoring software indicates the failure of a service or server. In contrast to this reactive approach, a proactive monitoring solution with Riemann allows admins to detect problems in advance.
Lead Image © Daniela Mangiuca, 123RF.com

Lead Image © Daniela Mangiuca, 123RF.com

Countering embedded malware attacks

With the resurgence of sophisticated macro virus attacks, new countermeasures are in order. We offer a few recommendations.
Lead Image © Marc Dietrich, 123RF.com

Lead Image © Marc Dietrich, 123RF.com

New features in jQuery 3

The functions and objects of the jQuery JavaScript library make the work of web developers much easier. Although jQuery 3 remains largely compatible with version 2, some changes might prevent its use.
Lead Image © vlue, 123RF.com

Lead Image © vlue, 123RF.com

Windows security with public key infrastructures

A rarely used feature for improving security in Windows environments relies on certificates issued for various applications, services, and procedures that is based on a public key infrastructure.
Lead Image © jala, Fotolia.com

Lead Image © jala, Fotolia.com

Build storage pools with GlusterFS

GlusterFS stores data across the network and can be used as a storage back end in cloud environments.
Lead Image © Yuri Arcurs, fotolia.com

Lead Image © Yuri Arcurs, fotolia.com

Implementing custom security frameworks with Bro

The Bro security framework takes a new approach to security monitoring, with the emphasis on trends and long-term analysis.
Lead Image © Soloviova Liudmyla, 123RF.com

Lead Image © Soloviova Liudmyla, 123RF.com

Activate HTTP/2 on web servers

HTTP/2 offers reduced website load times and other performance benefits, along with the promise of server push.
Lead Image © Stuart Miles, 123RF.com

Lead Image © Stuart Miles, 123RF.com

SDN and the future of networking

Networking is a central focus of IT. With all the virtual machines running on today's networks, it stands to reason that the experts would someday find a way to virtualize the network itself. Software-Defined Networking (SDN) is an architecture that promises to cope with new demands.