Articles

Lead Image © wamsler, 123RF.com

Lead Image © wamsler, 123RF.com

Protect yourself from infected MS Office files

Attacks on Microsoft Office files are increasing. A multilayered approach is your best protection against this malware.
Lead Image © jala, Fotolia.com

Lead Image © jala, Fotolia.com

Build storage pools with GlusterFS

GlusterFS stores data across the network and can be used as a storage back end in cloud environments.
Lead Image © P.Gudella, 123RF.com

Lead Image © P.Gudella, 123RF.com

A REST interface for FreeIPA

Access to the FreeIPA identity management framework is usually handled via a graphical web interface or a command-line tool, but the framework can also be queried directly via the JSON-RPC API.
Lead Image © Amy Walters, 123RF.com

Lead Image © Amy Walters, 123RF.com

DDoS protection in the cloud

OpenFlow and other software-defined networking controllers can discover and combat DDoS attacks, even from within your own network.
Lead Image © smeagorl, 123RF.com

Lead Image © smeagorl, 123RF.com

Swagger and OpenAPI Specification for documents

A REST API is especially useful for a developer if the API provider extensively documents the methods used. The Swagger tools not only semiautomatically generate an API reference, but a matching client SDK for many programming languages, as well.
Lead Image © Orlando Rosu, 123RF.com

Lead Image © Orlando Rosu, 123RF.com

Visualizing data captured by nmon

When speed, ease of use, and time to answer are paramount in performance monitoring and assessment of nmon logfiles, onTune nmon Analyzer Plus for Windows can help.
Lead Image © Stuart Miles, 123RF.com

Lead Image © Stuart Miles, 123RF.com

SDN and the future of networking

Networking is a central focus of IT. With all the virtual machines running on today's networks, it stands to reason that the experts would someday find a way to virtualize the network itself. Software-Defined Networking (SDN) is an architecture that promises to cope with new demands.
Lead Image © Brian Kenney, 123RF.com

Lead Image © Brian Kenney, 123RF.com

Exploring OpenStack's Trove DBaaS

DBaaS moves the database service to the cloud, promising a new database instance at the click of a mouse.
Lead Image © Daniela Mangiuca, 123RF.com

Lead Image © Daniela Mangiuca, 123RF.com

Countering embedded malware attacks

With the resurgence of sophisticated macro virus attacks, new countermeasures are in order. We offer a few recommendations.
© Sila Nimkittikul, 123RF.com

© Sila Nimkittikul, 123RF.com

Useful tools for automating network devices

Armed with the right tools, you can manage your network infrastructure both automatically and effectively in a DevOps environment.
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs



Support Our Work

ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.

Learn More”>
	</a>

<hr>		    
			</div>
		    		</div>

		<div class=