Articles

Lead Image © sandra zuerlein, fotolia.com

Lead Image © sandra zuerlein, fotolia.com

Halting the ransomware blackmail wave

In the tsunami of ransomware infections this year, the Locky encryption trojan is a high-water mark. With a constant stream of novel attack patterns, this continually evolving pest makes life difficult for IT managers, users, and security vendors. Here's how to protect yourself.
Lead Image © cepixx, 123RF.com

Lead Image © cepixx, 123RF.com

Safeguard and scale containers

Security, deployment, and updates for thousands of nodes prove challenging in practice, but with CoreOS and Kubernetes, you can orchestrate container-based web applications in large landscapes.
Lead Image © Ildar Galeev, 123RF.com

Lead Image © Ildar Galeev, 123RF.com

Targeted attacks on companies

Watering hole and spear phishing targeted attacks offer the greatest rewards to cybercriminals. Here's how to protect your company from these types of attacks.
Lead Image © Andrea Danti, 123RF.com

Lead Image © Andrea Danti, 123RF.com

Discover ransomware with PowerShell

Simple backup strategies cannot protect files encrypted by ransomware, because they can be affected as well. A PowerShell script can ensure that your files are okay before sending them to backup.
Lead Image © Amy Walters, 123RF.com

Lead Image © Amy Walters, 123RF.com

Writing SELinux modules

Much has happened in the field of SELinux in the last few years, including the development of new usability features. The current release makes it easier to write SELinux policy modules yourself.
Lead Image © scyther5, 123RF.com

Lead Image © scyther5, 123RF.com

Hyper-V containers with Windows Server 2016

The release of Windows Server 2016 also heralds a new version of Hyper-V, with improved cloud security, flexible virtual hardware, rolling upgrades of Hyper-V clusters, and production checkpoints.
Lead Image © Irina Tischenko, 123RF.com

Lead Image © Irina Tischenko, 123RF.com

Keeping Docker containers safe

Docker containers introduce serious security problems, but you can employ a number of methods to deploy them securely.
Lead Image © Gabriele Maccaroni, 123RF.com

Lead Image © Gabriele Maccaroni, 123RF.com

Designate provides DNS as a Service in OpenStack

The management of DNS entries works fundamentally differently for clouds than for classic setups; OpenStack Designate is a meaningful and well-functioning DNS as a Service implementation.
Lead Image © Sergey Nivens, 123RF.com

Lead Image © Sergey Nivens, 123RF.com

Putting an Active Directory domain controller in the Azure cloud

Once you start putting services in Azure cloud, you might want to add an Active Directory domain controller.
Lead Image © Author, 123RF.com

Lead Image © Author, 123RF.com

Application Monitoring with openITCOCKPIT

A good monitoring solution must provide information about applications and their performance. We show you how to monitor a database using openITCOCKPIT.
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs



Support Our Work

ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.

Learn More”>
	</a>

<hr>		    
			</div>
		    		</div>

		<div class=