Popular Searches

CloudSavvy IT - Cloud Computing for IT Pros

Power to the People? Why Hacktivism is Back

Hacktivists use hacking to further their activist goals, attacking companies they feel deserve punishment, exposure, and service disruption. Hacktivism is on the rise again. We look at what is driving this resurgence.

How to Monitor Docker Container Logs

Docker automatically aggregates container standard output and error streams (stdout/stderr) into log feeds which are retained by the Docker daemon. You can easily monitor logs to understand what’s going on in your containers.

Understanding Docker’s “latest” Tag

Docker tags are used to identify images by name. Each image can have multiple tags assigned. Tags look similar to my-image:latest, with the part before the colon defining the image name and the latter section specifying the version.

Debugging with GDB: Getting Started

That application crash need not be the end of the journey! Learn the basics of using GDB, the powerful GNU Debugger and know how to debug core dumps on Linux. Ideal for end users and debugging newcomers alike.

Passwordless Logins vs Multi-Factor Authentication

When upgrading to the scale of a business, reputable login and password protection methods need to stand up to scrutiny. But between forgoing passwords altogether for alternative identity verification methods and adding a layer of security to traditional passwords, which is the right choice?

The Problem With Passwords is People

Passwords have problems. They can be too weak, reused on multiple systems, deliberately shared with other users, and socially engineered. But that’s not the password’s fault. The problem is the people.

Why Text in The Terminal Only Has Sixteen Colors

If you’ve paid much attention to the Linux terminal window, or the Windows console, you might notice that text only comes in a limited set of colors. Why do the colors look the way they do? How IBM chose to represent text color on the original PC set the standard for text color to follow.