Articles

Photo by Mick Haupt on Unsplash

Photo by Mick Haupt on Unsplash

Security analysis with Security Onion

Security Onion offers a comprehensive security suite for intrusion detection that involves surprisingly little work.
Photo by Silas Baisch on Unsplash

Photo by Silas Baisch on Unsplash

Discover vulnerabilities with Google Tsunami

Google Tsunami security scanner detects errors that typically signal danger and outputs alerts. We look into how you can get the tool up and running and even write the required plugins yourself.
Photo by Jorge Coromina on Unsplash

Photo by Jorge Coromina on Unsplash

Build your own cloud with antMan

Discover the advantages and disadvantages of turning a bare metal system into the core of an antMan cloud and whether the free Community Edition and its limitations will work in your case.
Lead Image © Lucy Baldwin, 123RF.com

Lead Image © Lucy Baldwin, 123RF.com

System temperature as a dimension  of  performance

Sensor tools can provide highly variable data from CPUs, GPUs, and a variety of sources. We look at some tools to verify the temperature of components on diverse hardware.

Package management tools for Windows

Chocolatey and WinGet offer full-fledged package management on Windows, but which is best for your environment?
Photo by Dan Burton on Unsplash

Photo by Dan Burton on Unsplash

CrowdSec crowd security service

Threats can be detected and averted at an early stage with crowd security, in which organizations form a community to take concentrated action against cyberattacks by sharing attack data. We explain how this strategy works with the CrowdSec cloud service.
Lead Image © Kritiya Sumpun, 123RF.com

Lead Image © Kritiya Sumpun, 123RF.com

Verifying your configuration

Automated acceptance testing is a powerful tool for catching problems related to misconfiguration. We'll show you how to implement your own acceptance testing environment with a free tool called goss.
Lead Image © destinacigdem, 123RF.com

Lead Image © destinacigdem, 123RF.com

The end of SHA-1

The SHA-1 cryptographic hash function has been considered insecure for a long time. Some Linux distributions have banned or no longer use it – with some consequences, though.
Lead Image © Maksim Kabakou, 123RF.com

Lead Image © Maksim Kabakou, 123RF.com

Data security and data governance

Protecting data becomes increasingly important as the quantity and value of information grows. We describe the basics of data security and governance and how they intertwine.
Photo by Susann Schuster on Unsplash

Photo by Susann Schuster on Unsplash

Network monitoring with Zeek

Zeek offers an arsenal of scripts for monitoring popular network protocols and comes with its own policy scripting language for customization.
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs



Support Our Work

ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.

Learn More”>
	</a>

<hr>		    
			</div>
		    		</div>

		<div class=