Articles

Lead Image © Vaclav Volrab, 123RF.com

Lead Image © Vaclav Volrab, 123RF.com

The Benefit of Hybrid Drives

People still use hard disks even when SSDs are much faster and more robust. One reason is the price; another is the lower capacity of flash storage. Hybrid drives promise to be as fast as SSDs while offering as much capacity as hard drives. But can they keep that promise?

Redo Backup

Redo Backup backs up complete hard drives locally or over a network. The focus is on simple operation and high reliability in a variety of deployment scenarios.
Lead Image © Kitsadakron Pongha, 123RF.com

Lead Image © Kitsadakron Pongha, 123RF.com

Landscape

Manually maintaining large IT infrastructures almost inevitably leads to errors. Enter Canonical's Landscape, a commercial tool that uses a web interface and an API to gather information, render it graphically, and complete maintenance work.
Lead Image © zhao lizu, 123RF.com

Lead Image © zhao lizu, 123RF.com

TheSSS: World's Smallest Server Suite

Want to set up a full-fledged web, file, or proxy server in 10 seconds? No problem with TheSSS, the smallest server suite in the world. The new 8.0 version of this useful Linux distribution weighs in at a mere 30MB.
Lead Image © madpixblue, 123RF.com

Lead Image © madpixblue, 123RF.com

High Availability without Pacemaker

Managing your cluster could be so simple if it weren't so complicated. The object of many an admin's wrath in such cases is often a single component: Pacemaker. Luckily, other open source tools offer alternative options for high availability.
Lead Image © J.R. Bale, 123RF.com

Lead Image © J.R. Bale, 123RF.com

Managing Linux Memory

Even Linux systems with large amounts of main memory are not protected against bottlenecks and potentially drastic performance degradation because of memory shortage. In this article, we investigate the complex causes and test potential solutions.
Lead Image © tiero, 123RF.com

Lead Image © tiero, 123RF.com

OpenLDAP Workshop

Centralized user management with LDAP or Active Directory is the standard today, although many prefer to manage user data manually rather than build this kind of infrastructure. In this article, we look at a better approach with OpenLDAP.
Lead Image © George Tsartsianidis, 123RF.com

Lead Image © George Tsartsianidis, 123RF.com

Secure Your KVM Virtual Machines

A common misconception posits that software cannot cause mischief if you lock the system away in a virtual machine, because even if an intruder compromises the web server on the virtual machine, it will only damage the guest. If you believe this, you are in for a heap of hurt.
Lead Image © gepard1979, 123RF.com

Lead Image © gepard1979, 123RF.com

IPv6 Tables

We design a basic set of ip6tables rules for an IPv6 firewall.
Lead Image © raptorcaptor, 123RF.com

Lead Image © raptorcaptor, 123RF.com

Malware Analysis

We show you how to dig deep to find hidden and covert processes, clandestine communications, and signs of misconduct on your network.