Articles

Lead Image © Konstantin Shaklein, 123RF.com

Lead Image © Konstantin Shaklein, 123RF.com

Managing infrastructure as code with Spacelift

The Spacelift infrastructure-as-code management platform quickly rolls out complete setups to the cloud, minimizing the possibility of failure and problems.
Photo by redcharlie on Unsplash

Photo by redcharlie on Unsplash

Supercharge your software upgrade routine

Topgrade steps forward as the hero to help you keep an upper hand over updating and upgrading your stable of Linux applications.
Photo by cdd20 on Unsplash

Photo by cdd20 on Unsplash

A feature-rich drop-in-replacement for Microsoft Exchange

Grommunio is a completely open source and fully compatible drop-in replacement for Microsoft Exchange that uncouples your company from Microsoft's cloud strategy and its severe security and data protection issues.
Lead Image © Lucy Baldwin, 123RF.com

Lead Image © Lucy Baldwin, 123RF.com

An army of Xeon cores to do your bidding

Explore low-cost parallel computing.
Lead Image © Nah Ting Feng, 123RF.com

Lead Image © Nah Ting Feng, 123RF.com

Detecting system compromise

Runtime Integrity services provide assurance that a system is uncorrupted, offering increased confidence in core security services and the potential for enhanced security decisions across many use cases through the incorporation of integrity information in their inputs.
Lead Image © Sebastian Duda, 123RF.com

Lead Image © Sebastian Duda, 123RF.com

Build and host Docker images

When facing the challenge of packaging your application in a container, take into account your needs in terms of handling and security and investigate sensible options for hosting your own registry.
Lead Image © Konstantin Inozemtcev, 123RF.com

Lead Image © Konstantin Inozemtcev, 123RF.com

Fast email server deployments with iRedMail

Setting up and maintaining an email service in the data center doesn't have to be a nightmare. The iRedMail open source solution lets you deploy a full-featured email server on a number of platforms in a matter of minutes.
Lead Image © Rachael Arnott, 123RF.com

Lead Image © Rachael Arnott, 123RF.com

Border Gateway Protocol

We look at the Border Gateway Protocol, how it routes packets through the Internet, its weaknesses, and some hardening strategies.

Building a defense against DDoS attacks

Targeted attacks such as distributed denial of service, with thousands of computers attacking your servers until one of them caves in, cannot be prevented, but they can be effectively mitigated.
Photo by Kelly Sikkema on Unsplash

Photo by Kelly Sikkema on Unsplash

Recovering from a cyberattack in a hybrid environment

Restoring identity is an important part of disaster recovery, since it lays the foundation for restoring normality and regular operations. We look into contingency measures for hybrid directory services with Entra ID, the Graph API, and its PowerShell implementation.
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs



Support Our Work

ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.

Learn More”>
	</a>

<hr>		    
			</div>
		    		</div>

		<div class=