Articles

The Scribe  

Nmap does a great job with standard penetration testing tasks, but for specific security analyses, you will want to develop your own test scripts. The Nmap Scripting Engine makes this possible.

The new office  

We show how to set up Google Apps for Work and how to configure them for company use.

Recon  

The recon-ng web reconnaissance framework is an important tool in penetration testing.

Slimming System  

Deduplicating filesystems like SDFS store redundant data, such as that created by backups, only once, thereby saving valuable disk space. Additionally, the filesystem can distribute the data to be stored across multiple computer nodes.

Not Just Addresses  

Even if you don't have to have DHCP on your IPv6 network, you might want it anyway. Dhcpy6d is a promising DHCP option for IPv6.

Light into the Darkness  

OpenDaylight provides a flexible solution for setting up a software-defined networking environment. We show you how to get started.

Hunting the Invisible  

Virtual networks and server structures require additional mechanisms to ensure visibility of data streams. We show how to monitor and analyze network functions, even when virtualization is involved.

Analyzing large volumes of data with Apache Storm  

We take you through the installation of a Storm cluster and discuss how to create your own topologies.

Caution!  

The focus for container solutions such as Docker is increasingly shifting to security. Some vulnerabilities have been addressed, with plans to take further steps in the future to secure container virtualization.

Scrutinized  

The OpenBSD origins of the OpenSMTPD mail transfer agent makes SMTP easier to implement and manage and more secure.
Powered by eZ Publish™ CMS Open Source Web Content Management. Copyright © 1999-2014 eZ Systems AS (except where otherwise noted). All rights reserved.