Articles

Photo by Pedro Miranda on Unsplash

Photo by Pedro Miranda on Unsplash

Manage projects in SMEs with OpenProject

OpenProject supplies sensible, comprehensive project management for SMEs with few financial inputs.
Photo by Tim Foster on Unsplash

Photo by Tim Foster on Unsplash

Detect failures and ensure high availability

Eliminate single points of failure and service downtime with the DRBD distributed replicated storage system and the Corosync and Pacemaker service.

OpenCanary attack detection

The canary in a coal mine has made its way metaphorically into IT security with the OpenCanary honeypot for detecting attacks.
Photo by Pat Whelen on Unsplash

Photo by Pat Whelen on Unsplash

An open source object storage solution

We introduce the MinIO high-performance object store, its key features and applications, and some performance tips.
Photo by David Clode on Unsplash

Photo by David Clode on Unsplash

Test your system to help fight phishing attacks

The Gophish phishing framework lets you set up your own phishing campaigns to identify vulnerabilities and make users aware of these dangers.
Photo by Volodymyr Hryshchenko on unsplash

Photo by Volodymyr Hryshchenko on unsplash

Run your own chat server

The Matrix open standard implements secure, decentralized communication and comes with bridges to popular chat apps.
Lead Image © Lucy Baldwin, 123RF.com

Lead Image © Lucy Baldwin, 123RF.com

Creating load for fun and profit

Standard loads are essential to benchmarking.
Photo by Christopher Ruel on Unsplash

Photo by Christopher Ruel on Unsplash

Secure microservices with centralized zero trust

SPIFFE and SPIRE put strong workload identities at the center of a zero-trust architecture. They improve reliability and security by taking the responsibility for identity creation and management away from individual services and workloads.
Photo by Mike Wilson on Unsplash

Photo by Mike Wilson on Unsplash

Pentest your web server with Nikto

Check your web servers for known vulnerabilities.
Lead Image © Olivia, Fotolia.com

Lead Image © Olivia, Fotolia.com

Passkeys eliminate the need for password-based authentication

Passwords are becoming a thing of the past. We look into the basic weaknesses of passwords, explain what passkeys are all about, and assess their practicality.
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs



Support Our Work

ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.

Learn More”>
	</a>

<hr>		    
			</div>
		    		</div>

		<div class=