ADMIN #86 - Digital Issue
Issue #86: Data Obfuscation
Generalization, suppression, perturbation, and differential privacy are essential data protection techniques that enable a balance between data security and usability and ensure compliance with legal requirements.
DVD contents are not available with the digital edition.
Data Obfuscation Techniques
Data anonymization and pseudonymization are two key techniques that ensure privacy while enabling the use of data for analysis and decision making; two methods offer different approaches that vary as a function of use case.
Self-Hosted Chat Servers
Chat servers likely send confidential data to the cloud, so if you don't want to see your business on Google or Amazon, you can keep your information safely in your own data center with self-hosted options.
TutaCrypt
Your encrypted email messages might not be so secret after the quantum revolution picks up steam. Tuta Mail comes with a quantum-resistant alternative for users who take the long view.
OpenFaaS
Use advanced techniques for automation, optimization, and security to deploy serverless applications in a Linux environment.
Volcano
Optimize high-performance workloads on Kubernetes to avoid deadlocks.
Pritunl VPN Server
We offer the ultimate guide to deploying a self-hosted Pritunl VPN server with multifactor authentication.
Podman Desktop
Podman has become an attractive alternative to Docker, not least because it does not require a central daemon. We look at how to set about changing the guard and how you can use Podman Desktop to do so.
bootc Images
Use a container-based workflow to create bootable operating system images. In a few simple steps, you can use Podman to create ready-to-run images.
Flipper Zero
This mobile hacking tool can check a wide range of wireless connections for vulnerabilities. We look at potential applications in pen-testing scenarios.
Maltrail
Established sources form the basis of this traffic analysis software to identify malicious traffic on your network.
Slowloris
Harden your web servers against denial-of-service attacks that restrict the availability of web services.
Open-AudIT
Inventory, manage, and monitor IT assets, whether hardware, software, network device, or virtual machine. We explain how to install the software and work through the initial configuration.
OTOBO
OTOBO is a user-friendly and completely free ticket system designed to handle complex service requirements, offering an alternative, easy-to-use support tool with Active Directory integration and single sign-on.
Tactical RMM
This open source remote monitoring and management solution has agents to support Linux, macOS, and Windows.
Managing Dotfiles
The GNU Stow tool combined with Ansible can help you manage configuration files.
Passwords and Passphrases
Rules for secure passwords pose major obstacles for unsuspecting users, making passphrases and passkeys more important. Two recommendations illustrate team-capable password management.
Secure AD Design
Active Directory can be particularly problematic in terms of security. We reflect on the secure design, rigorous hardening, and security-conscious management of this service.
New sudo Log Format
An example shows how syslog-ng uses the new logging format of the sudo tool to process sudo messages.