Articles

Sublease  

Windows 10 supports the native execution of Linux binaries from various distributions through the Windows Subsystem for Linux. Even graphical Linux applications can make their way onto the Windows desktop.

At the Source  

Static code analysis tools like JSLint, Splint, RATS, and Coverity help you find code vulnerabilities.

Explosive Code  

The admin can generate load a number of ways with shell commands.

Secure Paths  

The new DNS over HTTPS standard from the Internet Engineering Task Force is meant to eliminate some of the known vulnerabilities of the Domain Name System.

Believable  

The open source Apache Cassandra database claims to be fail-safe, economical, highly scalable, and easy to manage. A few exercises show whether it lives up to its advertising.

Stormy Weather  

We present approaches and solutions for protecting yourself against attacks in the cloud.

Speechless  

A special VoIP analyzer lets you control the available bandwidth and quality of voice transmission by monitoring relevant network parameters.

Cloud Police  

Security segmentation into zones has long been the norm in data centers. Microsoft Azure Network Security Groups offers this kind of granular defense-in-depth security, including multilevel configuration of access rules.

Group Swim  

The Podman alternative to Docker is a daemonless container engine with a run time that executes on request in root or user mode.

Big Shift  

Red Hat launched the brand new OpenShift 4 with a number of changes that might suggest upgrading or even getting your feet wet if you've stayed out of the pool so far.