Articles

Photo by Lucas Gallone on Unsplash

Photo by Lucas Gallone on Unsplash

Three full-text desktop search engines

Desktop search engines such as Tracker, DocFetcher, and Recoll help track down files by their content, even in massive datasets.
Lead Image © Lucy Baldwin, 123RF.com

Lead Image © Lucy Baldwin, 123RF.com

Stretching devices with limited resources

Compressed memory solutions for small memory problems.
Lead Image © Galina Peshkova, 123RF.com

Lead Image © Galina Peshkova, 123RF.com

Endpoint Security for Windows 10

Windows 10, build 21H1, has numerous protection mechanisms out of the box. We look at the option for delaying updates, the components and features of Microsoft Defender, and recommendations for hardening the operating system.
Lead Image © SOMYOT TECHAPUWAPAT , 123RF.com

Lead Image © SOMYOT TECHAPUWAPAT , 123RF.com

Portable home directory with state-of-the-art security

The systemd Homed service makes it easy to move your home directory, and FIDO2 or PKCS#11 can secure the stored files.
Photo by nikko osaka on Unsplash

Photo by nikko osaka on Unsplash

Keeping container updates under control

Some application developers try to handle containerized applications as if they were conventional monoliths, but managing updates and security patches in containers needs a totally different approach.
Lead Image © Stuart Miles, 123RF.com

Lead Image © Stuart Miles, 123RF.com

Obtain certificates with acme.sh

We take a close look at acme.sh, a lightweight client for the ACME protocol that facilitates digital certificates for secure TLS communication channels.
Lead Image © stillfix, 123RF.com

Lead Image © stillfix, 123RF.com

Linux infrastructure servers for small and midsize businesses

Specialized Linux distributions are available for small and midsize businesses that promise economical and easy management of server applications and entire IT infrastructures. We looked at four of the best known candidates: ClearOS, NethServer, Zentyal, and Univention Corporate Server.
Lead Image © choreograph, 123RF.com

Lead Image © choreograph, 123RF.com

Linking Kubernetes clusters

When Kubernetes needs to scale applications, it searches for free nodes that meet a container's CPU and main memory requirements; however, when the existing hardware is at full capacity, the Kubernetes Cluster Federation project (KubeFed) takes the pain out of adding clusters.
Photo by Ian Taylor on Unsplash

Photo by Ian Taylor on Unsplash

Create secure simple containers with the systemd tools Nspawnd and Portabled

Systemd comes with two functions for container management that allow many programs to run more securely through isolation.
Lead Image © bowie15, 123RF.com

Lead Image © bowie15, 123RF.com

Collecting application logfiles with Kubernetes

Modern scale-out environments with containers make log collection difficult. We present concepts and methods for collecting application logfiles with a sidecar container in Kubernetes environments.
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs



Support Our Work

ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.

Learn More”>
	</a>

<hr>		    
			</div>
		    		</div>

		<div class=