Articles

Lead Image © Mykola Velychko, Fotolia.com

Lead Image © Mykola Velychko, Fotolia.com

Focusing on security in Active Directory

To prevent an intruder attack in Active Directory, Windows Server's security features along with freeware monitoring can save the day.
Photo by Quino Al on Unsplash

Photo by Quino Al on Unsplash

Analyzing tricky database problems

Database administrators at the Swiss foundation Switch were increasingly encountering corrupt data, which prompted a painstaking bug hunt. The solution they found increased performance by a factor of six.
Lead Image © Mikko J. Pitkänen, Fotolia.com

Lead Image © Mikko J. Pitkänen, Fotolia.com

Private cloud with Microsoft Azure Stack

Azure Stack is an Azure extension that implements an on-premises data center for consistent hybrid cloud deployments.
Lead Image © mikdam, 123RF.com

Lead Image © mikdam, 123RF.com

Preparing to move to the cloud

Because the cloud is ubiquitous, some companies think that outsourcing their business applications to Amazon, Google, and the like is a breeze. In fact, on the way, treacherous winds blow just off the beaten track.
Lead Image © abidal, 123rf.com

Lead Image © abidal, 123rf.com

Integrating scripts into Group Policy

Incorporating scripts into Group Policy can make a sys admin's job much easier.
Lead Image © Kirsty Pargeter, 123RF.com

Lead Image © Kirsty Pargeter, 123RF.com

Optimizing Windows Server 2016 performance

With Windows Server 2016, tweaking the settings and taking advantage of performance monitoring tools can help boost your system's performance.
Lead Image © Dmytro Demianenko, 123RF.com

Lead Image © Dmytro Demianenko, 123RF.com

Dialing up security for Docker containers

Docker containers are a convenient way to run almost any service, but admins need to be aware of the need to address some important security issues.
Photo by Alexander Redl on Unsplash

Photo by Alexander Redl on Unsplash

Persistent volumes for Docker containers

Equip containers with persistent storage using Docker's plugin system.
Lead Image © Natalia Lukiyanova, 123RF.com

Lead Image © Natalia Lukiyanova, 123RF.com

Open source intelligence tools for pen testing

Automating the pen test discovery process in the era of IoT, the cloud, and social media.
Lead Image © pat138241, 123RF.com

Lead Image © pat138241, 123RF.com

Supporting WebRTC in the enterprise

WebRTC has the potential to bring high-quality, easily developed, and interoperable real-time voice, video, and data communication to all manner of applications in web browsers.
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs



Support Our Work

ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.

Learn More”>
	</a>

<hr>		    
			</div>
		    		</div>

		<div class=