Articles

Under the Microscope  

In malware analysis, a sandbox can provide insight into the software and its run-time environment. While a sandbox can prevent the execution of malicious code with built-in detection mechanisms, malware developers can use countermeasures to take advantage of those same detection mechanisms.

Data Stacker  

The open source relational database RSQL aims to completely replace slimmed-down instances of Microsoft SQL Server.

Nexus  

WebRTC has the potential to bring high-quality, easily developed, and interoperable real-time voice, video, and data communication to all manner of applications in web browsers.

Solid Bodies  

Equip containers with persistent storage using Docker's plugin system.

Triathlon  

The Flatpak, Snap, and AppImage package formats work across distributions, but each has its specific disadvantages.

Ready for the Future  

Microsoft SQL Server 2017 introduces SQL Server on Linux, along with machine learning services, support for graph data, and on-premises Power BI.

Bug Hunt  

Bugs can live in Docker containers. Read on for tips on how to debug them.

Change of Address  

Windows Server 2016 automatically prefers IPv6 addresses, if available, but the manual configuration steps differ from IPv4 and necessitate new tools. Here's how to approach IPv6 in your daily admin work.

Private Eye  

Automating the pen test discovery process in the era of IoT, the cloud, and social media.

Externally Sealed Off  

To prevent an intruder attack in Active Directory, Windows Server's security features along with freeware monitoring can save the day.