DevOps The Ephemeral Immutable App Historically we have built our servers to fit the shape of our applications. There is an unending way to install and configure a running application, to size the memory and disk, and so
HowTo Usable OpenVPN in CentOS/Fedora/RHEL Guide for easy use of OpenVPN in RHEL7 family of Linux: Create a wrapper script vpnstart: #!/bin/bash name=$1 if [ -z "$name" ]; then echo "Specify a configuration" exit
DevOps Elements of an Application Deconstructing your application helps you to be able to better know how to manage its lifecycle. There are commonly four elements to an application: 1. Stack Application Framework, i.e. Java, Node, etc.
Technical Level Everybody is at a different level in technical skill. The guides on this blog use the following scale: Neophyte - anybody who can login to a computer Beginner - those starting to dig
Information Assurance Service Assurance Categories (SAC) The Department of Defense has defined a group of levels known as “Mission Assurance Categories” or MAC levels. These take the concept of what has been discussed over time in IT for categorizing
HowTo Application Installation Delivery Note: This concept pre-dates containers by some time, but has since been superseded by this newer technology. However, if you are still limited to running without containers, it still has merit. The AID
Security Biological Network Security *Note: this article was originally published on Security Focus, 16-Jan-2002. I have updated it in places to be more relevant to the current world constraints. Like a raging cancerous growth the Internet has