How to automate IT infrastructure management - ТOP 3 trends

Today we decided to talk about the tools, which IT companies and IaaS providers…


System administrator in non-IT company

Being a system administrator in a small company not from the IT sphere is a…


HAProxy 2.0 HTTP / TCP Balancer Release

Has been published the release of the HAProxy 2.0 load balancer, which allows…


Java in Docker: Disks & Native Memory Tracking

Of course, in addition to heap, non-heap and direct memory, the JVM uses a lot…


Java in Docker: OOM and memory cosumption

First of all, you need to prepare for the fact that OOMs are inevitable and you…


Java in Docker: CPU Limits & server class machine

We used to live in kvm virtual machines with CPU and memory limitations and, in…


Fail2ban and Exim on Ubuntu

The fail2ban utility is a popular password protection tool. The principle of…


Kerberos delegation & Abusing GPO Permissions

Kerberos delegation of authority allows you to reuse end-user credentials to…