Articles from ADMIN Issue 64
Create a full-blown Kubernetes cluster in a Docker container with just one command.
Forensic admins can use the Autopsy digital forensics platform to perform an initial analysis of a failed system, looking for traces of a potential attack.
The lax syntax verification of shell scripts and a lack of attention to detail in programming can create impressively dangerous security vulnerabilities.
PowerShell helpers let you automate searches in Active Directory and secure critical accounts.
Convince Jenkins as a Docker container to recognize self-signed certificates, verify that the instance is connecting to the correct online service, and that your traffic is transmitted in an encrypted format.
Enable and share performant block devices across a network of compute nodes with the RapidDisk kernel RAM drive module.
By using the LD_PRELOAD environment variable, you can improve performance without making changes to applications.
Every now and then, you find yourself in a situation where you expect better performance from your data storage drives. Either they once performed very well and one day just stopped, or they came straight out of the box underperforming. We explore a few of the reasons why this might happen.
The implementation of terminal user interface libraries enables an impressive variety of in-terminal graphics.