Juris

18 Added | 1 Magazine | 1 Like | @skri_me | Keep up with Juris on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Juris”

Can malware detect that it's running in your sandbox?

If you think an application is suspicious, then you might run it in a sandbox, a virtual machine, maybe use a debugger, and watch what it does. And …

Cybersecurity

Building an Effective Active Directory Lab Environment for Testing – Active Directory Security

This post is not meant to describe the ultimate lab configuration. Instead the focus is on a lab environment that can be stood up quickly and easily …

Virtualization

Detecting Offensive PowerShell Attack Tools – Active Directory Security

At DerbyCon V (2015), I presented on Active Directory Attack & Defense and part of this included how to detect & defend against PowerShell</i> …

Major Changes Coming from Microsoft Will Impact Your Career

Fail to embrace hybrid cloud, heterogeneous computing platforms and PowerShell automation could put your career on the skids, Don Jones warns in his …

Hybrid Clouds

When To Use Containers Or Virtual Machines, And Why

Docker is the new kid on the virtualization and containerization block. The technology started out as a project of the platform-as-a-service company …

A thorough introduction guide to Docker containers

Updated: May 10, 2015<p>Let me start with a big promise. You will absolutely LOVE this article today. It's going to be long, detailed and highly useful. …

77 Open Source Storage Applications

OpenStack is a full-featured cloud computing platform, which includes object and block cloud storage capabilities. Several commercial providers offer …

Best Practices for Linux OpenSSH Server

What is OpenSSH?<p>OpenSSH is a suite of security-related network-level utilities based on the SSH protocol, which help to secure network communications …

Linux

Why the open source software model is fundamentally broken

There was a very frank question pegged towards Slashdot readers a few months back, which I happened to stumble upon just by chance during some …

Linux

Linux Real-Time Process Monitor (Top) Explained

Is your Linux system running slow? Want to know what processes are hogging cpu time and/or memory in realtime? Are you just plain curious about how …

Hack Like a Pro: Linux Basics for the Aspiring Hacker, Part 23 (Logging)

Welcome back, my amateur hackers!<p>When you are using and administering Linux, it is important to be conversant in the use of the log files. As you …

Understanding Software-Defined Storage, Part One

Storage systems are essential to the data center. Given the exponential rate of data growth, it is increasingly becoming more and more challenging to …

DevOps

Linux file access permissions reference

Introduction<p>Linux file access permissions are used to control who is able to read, write and execute a certain file. This is an important …

Pets Vs. Cattle: The Rising Value of Cloud Computing Skills

By<p>Spencer E. Ante<p>Spencer E. Ante<p>The Wall Street Journal<p>Biography<p>A few months ago, James Weatherell updated his online resume on LinkedIn with his recent experience working with new cloud-computing software known as Open Stack. Since then, the phone of the 27-year-old computer engineer who works at …

Where's the best place to learn about cloud computing? The cloud, of course

How a seasoned IT veteran was able to quickly ramp up his skills for the next generation of technology platforms.<p>What's the best way to learn more …

Video Tutorials