Articles

Gardening  

Your Active Directory system doesn't have to be a walled garden. A few easy steps are all you need to integrate Linux with AD.

Nothing but the Truth  

Argo CD uses Git repositories as the source of truth for defining a desired application state and automates the deployment in target environments.

Choosing the Red Pill  

The Matrix open standard implements secure, decentralized communication and comes with bridges to popular chat apps.

Digital Safe  

Usernames and passwords play an important role in security. In this article, we show you how to set up the KeePass password manager and keep it synchronized across multiple devices.

Measuring Up  

Discover the sensors that already exist on your systems, learn how to query their information, and add them to your metrics dashboard.

Stressing Out  

Standard loads are essential to benchmarking.

Phish Food  

The Gophish phishing framework lets you set up your own phishing campaigns to identify vulnerabilities and make users aware of these dangers.

Object Lesson  

We introduce the MinIO high-performance object store, its key features and applications, and some performance tips.

Canary in a Coal Mine  

The canary in a coal mine has made its way metaphorically into IT security with the OpenCanary honeypot for detecting attacks.

On the Safe Side  

Eliminate single points of failure and service downtime with the DRBD distributed replicated storage system and the Corosync and Pacemaker service.