Articles

Two-Factor Authentication

Making your systems really secure can be a bit more complicated than resorting to the use of regular passwords. In this article, we provide an overview of authentication solutions and present potential approaches for common use cases.

Advanced Security in Windows Firewall

Windows Firewall with Advanced Security was introduced in Vista/Windows Server 2008. Compared with the old Windows Firewall, it offers many new features and possibilities.

Uncovering SQL Injections

Hardly a day goes by without reports of hackers breaking into government, military, or enterprise servers. If you analyze the details of the hacker’s approach, you will see that, in 90 percent of all cases, SQL injection was the root cause of a server’s compromise.

A Substitute for cron

Cron jobs are essential to managing Linux and Unix systems; however, the syntax is limited and prone to errors. A modern cron substitute – Whenjobs – sets out to remove these weaknesses.

TCP Fast Open

With TCP Fast Open, Google introduces a protocol extension implemented in the Linux kernel that avoids unnecessary latency in network traffic and promises up to 41 percent acceleration, depending on the application.

CoffeeScript: A Replacement for JavaScript?

Through the years, many languages have tried to improve or even replace JavaScript, including CoffeeScript, which runs in all JavaScript Runtime Environments and compiles into JavaScript.

Rex

Just as subjects must obey their king, all the computers and servers in an organization should follow the administrator’s commands. With Rex, you don’t even need to leave your admin throne.

Routing with Quagga

Cisco and Juniper have implemented routing protocols to help your router find the optimum path. On Linux, you can use software like Quagga, with its Zebra daemon, to help automate this process.

Guacamole: Remote Desktop

HTML5 offers a range of new features, such as audio and video support, without needing plugins like Flash or Java. This opens up completely new options in terms of content delivery via the web – and for mobile access to applications on the LAN.

Law of Averages – Load Averaging

Load averaging can be a source of confusion for admins. We provide a look at some basic considerations.