Articles

Sophisticated Heist  

A method known as Kerberoasting is an exploitation technique of the Kerberos authentication protocol. We take a closer look at the available safeguards and detection measures against this attack.

Curious Looks  

Prevent attackers from spying on DNS communication or manipulating responses by encrypting your DNS traffic on Linux with the DNS-over-TLS standard and the help of systemd-resolved.

Machine Brain  

AIOps brings artificial intelligence tools into everyday administrative work, with AI-supported automation of some admin responsibilities.

Contact  

We look at various approaches to RFID asset tracking, provide an understanding of the technologies and challenges involved, and cover some of the potential attack vectors.

Special Delivery  

The WinGet client for the Windows Package Manager improves the software installation experience for administrators, developers, and users and provides a way to create and share software in the WinGet package format for publishing to public and private repos.

Direct Line  

RustDesk supports self-hosted cross-platform remote support and maintenance. The client and optional basic server are open source and available free of charge.

Beginner's Mistake  

The AI skillset is currently limited, so you don't yet have to worry about AI replacing programmers. We look at the capabilities of AI scripting with free large language models and where it works best.

Right-Sized  

We look at three scaled-down, compact Kubernetes distributions for operation on edge devices or in small branch office environments.

Negotiating Hurdles  

Ransomware defense involves two strategies: identifying attacks and slowing the attackers to mitigate their effects.
Powered by eZ Publish™ CMS Open Source Web Content Management. Copyright © 1999-2014 eZ Systems AS (except where otherwise noted). All rights reserved.