Docker is Dead, Long Live the Container

Mirantis is acquiring Docker Enterprise Technology Platform and all associated IP: Docker Enterprise Engine, Docker Trusted Registry, Docker Unified Control Plane and Docker CLI. This amounts to what is the heart of Docker.

comments

VIM Cheatsheet

Summary: VIM - Noun, engery; enthusiasm Vim (a contraction of vi improved) is a clone, with additions, of Bill Joy's vi text editor program for Unix. Its almost 30 yrs old and still the go to text editor for many admins. There is always that set...

comments

Pen Testing in AWS

Pen testing in the cloud is a different beast than when your are testing on your own hardware. Here are some guidlines to use when Pen testing in AWS. Keep from getting that dreaded In Violation of Terms of Service email!

comments

What's old becomes new again

thenetworkadministrator.com is not dying but changing. It's been a while since the last time I wrote for thenetworkadministrator. I think I still had hair back then. Time has moved on, and so did I for a while. Now it's time to come full circle...

comments

Virus Insecurity

Viruses are to the IT department, what venereal diseases are to doctors. Once a virus can infiltrate a users contact list, it infects the user and all the people the user has ever had e-mail with. The "I Love You" virus is a perfect example of...

comments

The Healing Powers of SPAM

If there were any truth in Internet advertising, with respect to SPAM, the world would be a thinner, more medicated, lower interest rated, a place where lonely housewives finally have a place where they can be appreciated.

comments

2005 Top 10 Hacker Attack Tools

Computer security agents must master the same tools used by the hackers they seek, and many of these programs are available to download for free. The man-in-the middle attack, (also known as the monkey-in-the middle) is a useful method of...

comments

Phising

Phishing is what a spammer does when he or she wants to steal someone's identity. Some have labeled the action as Social-engineering hacking done through e-mail, but there are no hackers involved in this scam. Phishing is all the work of spammers...

comments