Home Search

download - search results

If you're not happy with the results, please do another search

Running Unikernels Under Linux

virgo - the linux unikernel runner Everyone is talking about unikernels today and the magical things they can do. Unikernels are ultra light-weight secure applications cross-compiled...

Secure Your Container Data With Ephemeral Docker Volumes

What with all the furor around containers and orchestrators, it can be easy to lose sight of some of their highly useful features. The...

ZorinOS Is a Great Linux Desktop For Any User

If there is one flavor of Linux that is best suited to help users transition from their current platform to Linux, I would have...

What’s New in MySQL 8.0

MySQL, the popular open-source database that’s a standard element in many web application stacks, has unveiled the first release candidate for version 8.0. Features to be...

Network Functions Virtualization: All Roads Lead to OPNFV

Previously in our discussion of the Understanding OPNFV book, we provided an introduction to network functions virtualization (NFV) and explored the role of OPNFV...

Installing Linux on your PC Is Super Easy – Here’s How to Do It

The Manjaro Linux developers announced the release of version 17.0.5 last week. My objective today is to use this release to show that Linux can be...

Redirecting Network Traffic: Part 2

In the previous article, I looked at how to use the clever redir utility to listen out for inbound traffic on a particular port...

Future Proof Your SysAdmin Career: Advancing with Open Source

For today’s system administrators, the future holds tremendous promise. In this ebook, we have covered many technical skills that can be big differentiators for...

Security Tools to Check for Viruses and Malware on Linux

Wait, Linux needs antivirus and anti-malware solutions? I thought it was immune to such things. Perhaps a bit of clarification is necessary here. First and...

Using Redir to Alter Network Traffic: Part 1

There are times when, despite your best efforts, you have little choice but to put a quick workaround in place. Reconfiguring network-border firewalls or...