credativ® Blog

Here you will find interesting news about industry-specific topics and us.

Categories
Category
Tags

Categories

Tags

Category: HowTos

21 May 2024

Apache Guacamole - Do you prefer Salsa or Guacamole?

If you had the choice, would you rather take Salsa or Guacamole? Let me explain, why you should choose Guacamole over Salsa. In this blog article, we want to take a look at one of the smaller Apache projects out there called Apache Guacamole. Apache Guacamole allows administrators to run a web based client tool […]

Read more

19 April 2024

Integrating Proxmox Backup Server into Proxmox Clusters

Integrating Proxmox Backup Server into Proxmox Clusters Proxmox Backup Server In today’s digital landscape, where data reigns supreme, ensuring its security and integrity is paramount for businesses of all sizes. Enter Proxmox Backup Server, a robust solution poised to revolutionize data protection strategies with its unparalleled features and open-source nature. At its core, Proxmox Backup […]

Read more

09 April 2024

Migrating VMs from VMware ESXi to Proxmox

Migrating VMs from VMware ESXi to Proxmox In response to Broadcom’s recent alterations in VMware’s subscription model, an increasing number of enterprises are reevaluating their virtualization strategies. With heightened concerns over licensing costs and accessibility to features, businesses are turning towards open source solutions for greater flexibility and cost-effectiveness. Proxmox VE, in particular, has garnered […]

Read more

26 April 2022

Manually Create an AppArmor Profile for Nginx

As described in the previous post, access control on Unix-like systems is traditionally based on the principle of Discretionary Access Control (DAC). Applications and services run under a specific user and group ID and are granted the corresponding access rights to files and folders. AppArmor implements a Mandatory Access Control for Linux, based on the […]

Read more

15 March 2022

Introduction to AppArmor

Fundamentally, access control under Linux is a simple matter: Files specify their access rights (execute, write, read) separately for their owner, their group, and finally, other users. Every process (whether a user’s shell or a system service) running on the system operates under a user ID and group ID, which are used for access control. […]

Read more