Articles

Photo by Patrick Schneider on Unsplash

Photo by Patrick Schneider on Unsplash

Kafka: Scaling producers and consumers

A guide to 10x scaling in Kafka with real-world metrics for high throughput, low latency, and cross-geographic data movement.

Harden your Apache web server

Cyberattacks don't stop at the time-honored Apache HTTP server, but a smart configuration, timely updates, and carefully considered security strategies can keep it from going under.
Lead Image © ginasanders, 123RF.com

Lead Image © ginasanders, 123RF.com

Protect privileged accounts in AD

Granular protection for highly privileged accounts is granted by the Protected Users group in Active Directory and Kerberos authentication policies.
Lead Image © Yewkeo, 123RF.com

Lead Image © Yewkeo, 123RF.com

Endlessh and tc tarpits slow down attackers

Keep an attacker's connections open in an Endlessh "tarpit" or delay incoming connections with the more traditional rate-limiting approach of tc.
Lead Image © zelfit, 123RF.com

Lead Image © zelfit, 123RF.com

MinIO: Amazon S3 competition

MinIO promises no less than a local object store with a world-class S3 interface and features that even the original lacks.
Lead Image © Vlad Kochelaevskiy, 123RF.com

Lead Image © Vlad Kochelaevskiy, 123RF.com

Machine learning and security

Machine learning can address risks and help defend the IT infrastructure by strengthening and simplifying cybersecurity.
Lead Image © Dmitriy Shpilko, 123RF.com

Lead Image © Dmitriy Shpilko, 123RF.com

Pulumi multicloud orchestrator

Pulumi promises a unified interface and surface for orchestrating various clouds and Kubernetes.
Lead Image © lassedesignen, 123RF.com

Lead Image © lassedesignen, 123RF.com

Secure authentication with FIDO2

The FIDO and FIDO2 standard supports passwordless authentication. We discuss the requirements for the use of FIDO2 and show a sample implementation for a web service.
Lead Image © Chatree Jaiyangyuen, 123rf.com

Lead Image © Chatree Jaiyangyuen, 123rf.com

Identity and access management with OpenIAM

Identity and access management plays a central role in modern IT infrastructures, with its local resources, numerous applications, and cloud services. We investigate how OpenIAM implements centralized user management.
Lead Image © Maxim Borovkov, 123RF.com

Lead Image © Maxim Borovkov, 123RF.com

New features in PHP 8

After about two years of development, version 8 of the popular PHP scripting language has been released. It comes with a number of innovations and ditches some obsolete features
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs



Support Our Work

ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.

Learn More”>
	</a>

<hr>		    
			</div>
		    		</div>

		<div class=