This is the Sparkhaus Media shop for customers in the United Kingdom (GBP).
If you are located in Europe or Switzerland (EUR/CHF), please click here.
For delivery to all other countries, please click here to be directed to our US Dollar shop.
ADMIN #90 - Digital Issue
Issue #90: VoIP Network Security
Session Initiation Protocol provides both the underpinnings for VoIP and a potential attack vector for hackers. Open source tools can help you test and secure your VoIP networks.
DVD contents are not available with the digital edition.
The PDF will be released in early December 2025.
Checking VoIP Networks
Open source tools can help you discover vulnerabilities in VoIP networks, fix typical problems, and boost infrastructure security and functionality.
Microsoft Loop
This flexible collaboration tool aims to redefine seamless integration and dynamic teamwork for improved real-time collaboration.
Simulating Network Traffic
Network simulators provide the information admins need to plan and grow wired and wireless networks.
Ollama+Cursor
An on-premises open source AI developer workflow uses Ollama+Cursor for maximum data sovereignty and control.
Sigstore Cosign
The Sigstore Cosign, Fulcio, and Rekor ecosystem can improve software supply chain security by making signatures easy to use and difficult to subvert.
bWatch
After 21 years, our HPC author returns to bWatch, a simple cluster monitoring tool from the early days of Beowulf.
Kata Containers
We explore the architecture and configuration of Kata Containers on Ubuntu with Docker, focusing on how lightweight virtual machines can deliver strong workload isolation while preserving the agility and performance of traditional containers.
Administrator Protection
Microsoft's replacement for the deprecated User Account Control security mechanism provides state-of-the-art protection by employing the principle of least privilege and just-in-time privilege assignment.
Tetragon
This comprehensive security suite for Kubernetes is based on eBPF and focuses on monitoring and proactive threat detection with tracing for popular programming languages.
Secure AIX
Modernizing AIX security with multifactor authentication has never been easier than with Google Authenticator, which brings two-factor authentication to your AIX system.
Puppet Autosign Policies
Automated Puppet enrollment on Debian workstations can be enforced with autosign scripts that implement your security policy with a one-time enrollment script and an automated installation preseed.
x2openEuler Migration
Easily migrate your old CentOS 7 systems to the modern openEuler with the x2openEuler migration toolset.
Logger
Store user-specified messages in syslog to gather information for HPC admin tasks.
Hotpatching Win Server 2025
Hotpatching technology on Windows Server 2025 reduces downtime and maintenance windows, but it comes at a price in the truest sense of the word.
MLOps Pipeline
A production-grade MLOps pipeline automates the entire machine learning lifecycle, from data ingestion to deployment in a Kubernetes environment.