How to automate IT infrastructure management - ТOP 3 trends
Today we decided to talk about the tools, which IT companies and IaaS providers…
System administrator in non-IT company
Being a system administrator in a small company not from the IT sphere is a…
HAProxy 2.0 HTTP / TCP Balancer Release
Has been published the release of the HAProxy 2.0 load balancer, which allows…
Java in Docker: Disks & Native Memory Tracking
Of course, in addition to heap, non-heap and direct memory, the JVM uses a lot…
Java in Docker: OOM and memory cosumption
First of all, you need to prepare for the fact that OOMs are inevitable and you…
Java in Docker: CPU Limits & server class machine
We used to live in kvm virtual machines with CPU and memory limitations and, in…
Fail2ban and Exim on Ubuntu
The fail2ban utility is a popular password protection tool. The principle of…
Kerberos delegation & Abusing GPO Permissions
Kerberos delegation of authority allows you to reuse end-user credentials to…