Customers in Europe, Switzerland, and the United Kingdom, please click here.
Attention Existing Customers: Welcome to our new shop! Your account has not been migrated from the old system. If you wish to purchase something, you will need to create a new account or checkout as a guest. Please note that guest checkout is not available for digital products or subscriptions.
ADMIN #63 - Digital Issue
This issue we are all about automation and configuration with some tools to lighten your load.
DVD contents are not available with the digital edition.
IN THIS ISSUE:
This powerful automator does without complex syntax, self-documents, and performs well compared with other configuration management tools.
This less well known automation tool promises more efficient configuration management and strict compliance with policies.
Automation with Chef
The chef de automation combines configuration management, deployment monitoring, and integrated compliance checks.
The venerable rock of configuration management is not easy to master, but it is flexible and secure for those willing to learn.
This fast and reliable modular toolbox contains ready-made modules for many configuration management functions.
Docker and iptables
Tune the iptables configuration for Docker by establishing your own forwarding rules.
Discover the improvements made by HTTP/2 and HTTP/3 over HTTP/1.1.
Untangle NG Firewall
Apps come together like pieces of a jigsaw in this easy-to-use but still very powerful firewall solution.
With the right settings and small tools, security in virtual environments can be increased significantly by tweaking the on-board tools.
Traefik promises not only to manage mesh implementations for container environments reliably, but to do so in a way that makes them enjoyable to administer.
Shadow Permissions in AWS
Malicious attackers are trying to conquer your AWS castle in the cloud. To mount a strong defense, you'll need a deeper understanding of privilege escalation and shadow admin permissions.
MySQL Security Tips
Security safeguards protect data on MySQL servers.
The danger of ransomware attacks calls for a robust backup and monitoring strategy.
The future of flexible, performant, and highly available storage.
Python Pattern Matching
A controversial change is taking place in Python version 3.10 known mainly from functional languages: pattern matching.
Performance Tuning Dojo
We look at the tools needed to discover, configure, and monitor an accelerated cloud instance, employing the simplest possible tool to get the job done.