Articles

Lead Image © Amy Walters, 123RF.com

Lead Image © Amy Walters, 123RF.com

DDoS protection in the cloud

OpenFlow and other software-defined networking controllers can discover and combat DDoS attacks, even from within your own network.
Lead Image © Kritiya Sumpun, 123RF.com

Lead Image © Kritiya Sumpun, 123RF.com

Systemd network management and container handling

Version 219 of the controversial systemd init system introduces a number of comprehensive changes. We take a closer look at the innovations in network management and container handling.
Lead Image © almagami, 123RF.com

Lead Image © almagami, 123RF.com

Attacks on HTTPS Connections

HTTPS protects a connection from both tapping and manipulation, but only if a man in the middle hasn't already infiltrated the Internet connection. We highlight the weaknesses in HTTPS and demonstrate how to protect your client and server.
Lead Image © Stuart Miles, 123RF.com

Lead Image © Stuart Miles, 123RF.com

Getting a free TLS certificate from Let's Encrypt

A free TLS certificate from Let's Encrypt means you can add encryption to your network for no cost, so you don't have any more excuses for failing to encrypt.
Lead Image © iofoto, Fotolia.com

Lead Image © iofoto, Fotolia.com

Multifactor authentication with Google Authenticator

Google Authenticator provides one-time passwords to smartphone owners for multifactor authentication, or you can integrate it into other applications, such as blogs.
Lead Image © Tjefferson, 123RF.com

Lead Image © Tjefferson, 123RF.com

Virtual networks with Hyper-V in Windows Server 2016

Microsoft provides some interesting virtualization features in current and future versions of Windows Server. You can connect or isolate virtual machines, and Windows Server 2016 even supports virtual switches.
Lead Image © Ulrich Krellner, 123RF.com

Lead Image © Ulrich Krellner, 123RF.com

Managing Linux Filesystems

Linux filesystems range from block-based network filesystems, to temporary filesystems in RAM, to pseudo filesystems. We explain how filesystems are set up and how to manage them.
Lead Image © SV-Luma, 123RF.com

Lead Image © SV-Luma, 123RF.com

Live migration of virtual machines with KVM

Live migration of virtual machines is necessary when you need to achieve high-availability setups and load distribution.
Lead Image © Ping Han, 123RF.com

Lead Image © Ping Han, 123RF.com

Opportunities and risks: Containers for DevOps

Containers are an essential ingredient for various DevOps concepts, but used incorrectly, they do more harm than good.
Lead Image © Paul Tobeck, fotolia.com

Lead Image © Paul Tobeck, fotolia.com

Ease your network inventory pain with Spiceworks

Keeping track of hardware, software, and licenses is next to impossible in these days of BYOD and virtualization. Spiceworks Inventory solves the problem with a single, small executable full of open source software and a web browser.