Articles

Digging In  

Windows attack surface reduction policies make significant progress in protecting your entire IT infrastructure.

Home in the Clouds  

Software from the open source OpenEBS project provides a cloud-native storage environment that makes block devices available to individual nodes in the Kubernetes cluster.

Access Granted  

Log in to your account securely without a password with LDAP and a schema to establish the objects and attributes required for FIDO2 authentication.

Perfect Harmony  

With the integration of Podman and systemd, you can put any software inside a container under the control of systemd and see almost no difference between running the service directly on the host or inside a container.

Key Moments  

Most Internet services require password-protected individual accounts. A password manager can help you keep track of all your access credentials.

Inspector General  

Teler is an intrusion detection and threat alert command-line tool that analyzes logs and identifies suspicious activity in real time.

Master of the Keys  

Google and Facebook are two of the biggest providers for single sign-on on the web, with OAuth2 and OpenID, but if you don't want to put your customers' or employees' data in their hands, Red Hat's Keycloak software lets you run your own operations with the option of integrating existing Kerberos or LDAP accounts.

Conversion Work  

After about two years of development, version 8 of the popular PHP scripting language has been released. It comes with a number of innovations and ditches some obsolete features

Sticky Fingers  

Keep an attacker's connections open in an Endlessh "tarpit" or delay incoming connections with the more traditional rate-limiting approach of tc.

Premium Storage  

MinIO promises no less than a local object store with a world-class S3 interface and features that even the original lacks.