Home Search
download - search results
If you're not happy with the results, please do another search
Running Unikernels Under Linux
virgo - the linux unikernel runner
Everyone is talking about unikernels today and the magical things they can do.
Unikernels are ultra light-weight secure applications cross-compiled...
Secure Your Container Data With Ephemeral Docker Volumes
What with all the furor around containers and orchestrators, it can be easy to lose sight of some of their highly useful features. The...
ZorinOS Is a Great Linux Desktop For Any User
If there is one flavor of Linux that is best suited to help users transition from their current platform to Linux, I would have...
What’s New in MySQL 8.0
MySQL, the popular open-source database that’s a standard element in many web application stacks, has unveiled the first release candidate for version 8.0.
Features to be...
Network Functions Virtualization: All Roads Lead to OPNFV
Previously in our discussion of the Understanding OPNFV book, we provided an introduction to network functions virtualization (NFV) and explored the role of OPNFV...
Installing Linux on your PC Is Super Easy – Here’s How to Do It
The Manjaro Linux developers announced the release of version 17.0.5 last week. My objective today is to use this release to show that Linux can be...
Redirecting Network Traffic: Part 2
In the previous article, I looked at how to use the clever redir utility to listen out for inbound traffic on a particular port...
Future Proof Your SysAdmin Career: Advancing with Open Source
For today’s system administrators, the future holds tremendous promise. In this ebook, we have covered many technical skills that can be big differentiators for...
Security Tools to Check for Viruses and Malware on Linux
Wait, Linux needs antivirus and anti-malware solutions? I thought it was immune to such things. Perhaps a bit of clarification is necessary here.
First and...
Using Redir to Alter Network Traffic: Part 1
There are times when, despite your best efforts, you have little choice but to put a quick workaround in place. Reconfiguring network-border firewalls or...