Articles

Improved Separation  

Microsegmentation promises substantial improvements over classic architectures for the protection of applications and increased security when building out the efficiency of a data center.

Safety Net  

Microsoft has extended the failover options for Hyper-V in Windows Server 2016 to include two new cluster modes, as well as the ability to define an Azure Cloud Witness server. We look at how to set up a Hyper-V failover cluster.

Cuckoo, Cuckoo  

The open source Cuckoo Sandbox malware analysis system investigates malicious software.

Operation Overview  

The Microsoft Operations Management Suite provides a comprehensive monitoring solution in the cloud that offers a high degree of flexibility and scalability.

Escaping the Trap  

Upgrading domain controllers or installing new servers can cause problems with name resolution, Active Directory replication, and Group Policy. A coordinated approach can isolate these errors in Windows Server 2008 or newer.

Foreign Territory  

By the time the annual 2016 Red Hat Summit was held at the end of June in San Francisco, the previously announced support for .NET applications on Red Hat Enterprise Linux had been implemented. We take a closer look at the implementation and how admins can create a .NET environment under Linux.

Say Again?  

Optimize your PowerShell scripts with loops when automating tasks that are repeated regularly and frequently.

Package Insurance  

Serious distributions try to protect their repositories cryptographically against tampering and transmission errors. Arch Linux, Debian, Fedora, openSUSE, and Ubuntu all take different, complex, but conceptually similar approaches.

Virtual Cables  

Windows Server 2016 takes a big step toward software-defined networking, with the Network Controller server role handling the centralized management, monitoring, and configuration of network devices and virtual networks. This service can also be controlled with PowerShell and is particularly interesting for Hyper-V infrastructures.

Weak Link  

Docker containers introduce serious security problems, but you can employ a number of methods to deploy them securely.
Powered by eZ Publish™ CMS Open Source Web Content Management. Copyright © 1999-2014 eZ Systems AS (except where otherwise noted). All rights reserved.