Articles
Malware Analysis
We show you how to dig deep to find hidden and covert processes, clandestine communications, and signs of misconduct on your network.
High Availability without Pacemaker
Managing your cluster could be so simple if it weren't so complicated. The object of many an admin's wrath in such cases is often a single component: Pacemaker. Luckily, other open source tools offer alternative options for high availability.
TheSSS: World's Smallest Server Suite
Want to set up a full-fledged web, file, or proxy server in 10 seconds? No problem with TheSSS, the smallest server suite in the world. The new 8.0 version of this useful Linux distribution weighs in at a mere 30MB.
Live Kernel Update Tools
Two projects by Red Hat and SUSE – Kpatch and kGraft – attempt to patch the kernel with security updates on the fly. We look at features in these two tools and their suitability for production use.
The Benefit of Hybrid Drives
People still use hard disks even when SSDs are much faster and more robust. One reason is the price; another is the lower capacity of flash storage. Hybrid drives promise to be as fast as SSDs while offering as much capacity as hard drives. But can they keep that promise?
Redo Backup
Redo Backup backs up complete hard drives locally or over a network. The focus is on simple operation and high reliability in a variety of deployment scenarios.
Nagios Passive Checks
Why spam yourself with useless notifications every time a script completes successfully? You can use Nagios to screen the notices and just send the ones that need action.
Save and Restore Linux Processes with CRIU
With CRIU, you can freeze the current state of a process and save it, then bring it back to life and continue from the point at which it was frozen.
Disaster recovery for Windows servers
Need to fix a Windows server? We'll discuss some techniques for getting your system back. You'll also learn some tricks for Active Directory and Exchange.
Hardware MFA: Death to the password!
Around since the 1960s, passwords are still the mainstay for authentication. The good news is you have alternatives in hardware multifactor authentication.
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Most Popular
Support Our Work
ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.
