The Ansible In Depth white paper outlines Ansible’s use cases in four categories: Configuration management Application deployment Orchestration: for coordinating a multi-machine process such as…
There are too many metrics that describes some aspects about memory in Linux. Further to an old article on this site, where several concepts were…
This article explains how two most common authentication mechanisms (NTLM and Kerberos) work. Both authentication protocols are based on symmetric key cryptography. The protocols themselves…
Introduction Authentication is used in many protocols (such as LDAP binding) and it usually involves sending password. Given the nature of authentication protocol, its traffic…
What for Someone who I maintain website for realized the bill of a public cloud provider isn’t exactly as expected. The computing resource falls under…