Articles

Inspector General  

Teler is an intrusion detection and threat alert command-line tool that analyzes logs and identifies suspicious activity in real time.

Master of the Keys  

Google and Facebook are two of the biggest providers for single sign-on on the web, with OAuth2 and OpenID, but if you don't want to put your customers' or employees' data in their hands, Red Hat's Keycloak software lets you run your own operations with the option of integrating existing Kerberos or LDAP accounts.

Conversion Work  

After about two years of development, version 8 of the popular PHP scripting language has been released. It comes with a number of innovations and ditches some obsolete features

Sticky Fingers  

Keep an attacker's connections open in an Endlessh "tarpit" or delay incoming connections with the more traditional rate-limiting approach of tc.

Premium Storage  

MinIO promises no less than a local object store with a world-class S3 interface and features that even the original lacks.

Computer Cop  

Machine learning can address risks and help defend the IT infrastructure by strengthening and simplifying cybersecurity.

The Right Tools  

If you use IIS on Windows servers, you can fully access the web server's features and manage it effectively with on-board tools, including the well-known Internet Information Services (IIS) Manager, Windows Admin Center, and PowerShell.

Pushbutton  

Red Hat delivers an installer that lets you automate the installation of RHEL and CentOS in a preboot execution environment.

Build by Number  

The basic container images on which you base your work can often be out of date. We show you how to solve this problem and create significantly leaner containers.

The Streamer  

Apache Kafka reads and writes events virtually in real time, and you can extend it to take on a wide range of roles in today's world of big data and event streaming.