Articles

Lead Image © Paul Tobeck, fotolia.com

Lead Image © Paul Tobeck, fotolia.com

Ease your network inventory pain with Spiceworks

Keeping track of hardware, software, and licenses is next to impossible in these days of BYOD and virtualization. Spiceworks Inventory solves the problem with a single, small executable full of open source software and a web browser.
Lead Image © Viktor Gladkov, 123RF.com

Lead Image © Viktor Gladkov, 123RF.com

What's new in Ansible 2.0

The new version of the Ansible IT automation platform has a revised and faster engine and 200 new modules.
Lead Image © fourseasons, 123RF.com

Lead Image © fourseasons, 123RF.com

Security analysis with Microsoft Advanced Threat Analytics

Classic security safeguards, like antivirus and firewall products, are imperative for system protection. To search proactively for network intruders, as well, Microsoft offers Advanced Threat Analytics – a tool that will help even less experienced admins.
Lead Image © Fernando Gregory, 123RF.com

Lead Image © Fernando Gregory, 123RF.com

Freeing your data from ransomware

Cyber criminals don't need access to sensitive information to blackmail their victims. Simply encrypting everyday files can be enough to extort money from users, whose data is only unencrypted after they pay a ransom – and possibly not even then.
Lead Image © SORAPONG CHAIPANYA, 123RF.com

Lead Image © SORAPONG CHAIPANYA, 123RF.com

Desired State Configuration for Linux

The combination of Open Management Infrastructure standards and the performance of Windows PowerShell opens new perspectives on heterogeneous networks, making PowerShell a realistic option as a management console for Unix and Linux.
Lead Image © krisckam, 123RF.com

Lead Image © krisckam, 123RF.com

Manage resources with AWS CloudFormation

CloudFormation lets you describe and manage a collection of Amazon Web Services resources. Defining associated dependencies and run-time parameters is quite easy with CloudFormation. We show you how to create a simple WordPress blog and delete it again.
Lead Image © iofoto, Fotolia.com

Lead Image © iofoto, Fotolia.com

Multifactor authentication with Google Authenticator

Google Authenticator provides one-time passwords to smartphone owners for multifactor authentication, or you can integrate it into other applications, such as blogs.
Lead Image © Ping Han, 123RF.com

Lead Image © Ping Han, 123RF.com

Opportunities and risks: Containers for DevOps

Containers are an essential ingredient for various DevOps concepts, but used incorrectly, they do more harm than good.
Lead Image © SV-Luma, 123RF.com

Lead Image © SV-Luma, 123RF.com

Live migration of virtual machines with KVM

Live migration of virtual machines is necessary when you need to achieve high-availability setups and load distribution.
Lead Image © Kritiya Sumpun, 123RF.com

Lead Image © Kritiya Sumpun, 123RF.com

Systemd network management and container handling

Version 219 of the controversial systemd init system introduces a number of comprehensive changes. We take a closer look at the innovations in network management and container handling.
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs



Support Our Work

ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.

Learn More”>
	</a>

<hr>		    
			</div>
		    		</div>

		<div class=