Articles from ADMIN Issue 53
We compare Google Cloud Storage for Internet-based backups with Amazon S3.
Security segmentation into zones has long been the norm in data centers. Microsoft Azure Network Security Groups offers this kind of granular defense-in-depth security, including multilevel configuration of access rules.
We present approaches and solutions for protecting yourself against attacks in the cloud.
To thwart credential harvesters at the network interstice, you must understand how attackers exploit browser transactions.
We show you how one company uses GitLab CI as a platform for continuous integration and deployment processes.
Perl sockets work like file handles that can span across a network or the entire Internet.
A special VoIP analyzer lets you control the available bandwidth and quality of voice transmission by monitoring relevant network parameters.
The Easy-RSA tool that comes with OpenVPN provides trouble-free open source PKI management.
Static code analysis tools like JSLint, Splint, RATS, and Coverity help you find code vulnerabilities.
The admin can generate load a number of ways with shell commands.