Articles

Light into Darkness  

Zeek offers an arsenal of scripts for monitoring popular network protocols and comes with its own policy scripting language for customization.

Heat Seeker  

Sensor tools can provide highly variable data from CPUs, GPUs, and a variety of sources. We look at some tools to verify the temperature of components on diverse hardware.

Confidential Game  

Now that web content is encrypted by HTTPS, the underlying name resolution is often unprotected. We look at the classic DNS protocol and investigate whether DNS over HTTPS could be the solution to ensure the confidentiality of DNS requests.

Small Scale  

You can have your cake and eat it, too: MicroVMs feature the strong isolation of virtual machines and lightweight behaviors of containers.

Trackers  

How to deal with threat intelligence on the corporate network when the existing security tools are not effective.

Just Enough  

What a user is allowed to do in a program is usually defined by a role model, which often poses numerous challenges, especially in the cloud or for infrastructure as code. The free Open Policy Agent offers a flexible way to manage user rights.

Fast Track  

The UDP-based Quick UDP Internet Connections (QUIC) protocol comes with mandatory TLS encryption and promises faster speeds.

Hunter  

The various components of cloud-native applications are always exchanging information, which makes troubleshooting difficult. The Jaeger tracing framework helps hunt down the perpetrators.

One for All  

The open source Weka tool applies a wide variety of analysis methods to data without the need for advanced programming skills and without having to change environments.

Lightning Strike  

Puppet Bolt free software automates administrative tasks to speed up the admin's daily work.