Articles

Lead Image © Krishna Kumar-Sivaraman, 123RF.com

Lead Image © Krishna Kumar-Sivaraman, 123RF.com

Monitoring, alerting, and trending with the TICK Stack

If you are looking for a monitoring, alerting, and trending solution for large landscapes, you will find all the components you need in the TICK Stack.
Lead Image © Tatiana Venkova, 123RF.com

Lead Image © Tatiana Venkova, 123RF.com

Kali Linux is the complete toolbox for penetration testing

The Kali Linux distribution is a complete toolbox for penetration testing.
Lead Image © scyther5, 123RF.com

Lead Image © scyther5, 123RF.com

Quick and easy SaaS provisioning for OpenLDAP

Provisioning SaaS apps for OpenLDAP users with Okta Cloud Connect lets you retain control of your users' data and access to applications, yet gives them the tools they want.
Lead Image © Steven Cukrov, 123rf.com

Lead Image © Steven Cukrov, 123rf.com

Link aggregation with kernel bonding and the Team daemon

The Linux world has different implementations for integrating multiple network cards: kernel old-timer ifenslave and the younger libteam.
Lead Image © yewkeo, 123RF.com

Lead Image © yewkeo, 123RF.com

Exploring SQL Server on Linux

SQL Server runs on Linux now. We'll show you how Microsoft developers made their massive database system Linux ready, and we'll help you get started with setting up SQL Server on your own Linux system.
Lead Image Photo by Ricardo Resende on Unsplash

Lead Image Photo by Ricardo Resende on Unsplash

Sharing threat information with MISP

The Malware Information Sharing Platform lets you record and document security incidents – and share the information with users on other networks.
Lead Image © Kheng Ho Toh, 123rf.com

Lead Image © Kheng Ho Toh, 123rf.com

Optimization and standardization of PowerShell scripts

When PowerShell one-liners become full-blown scripts that have an effect throughout the enterprise, IT managers need to review their software development strategies. We look at PowerShell best practices for script design, notation, error handling, and documentation.
Lead Image © Lucy Baldwin, 123RF.com

Lead Image © Lucy Baldwin, 123RF.com

Assess USB performance while exploring storage caching

Use dd fluently to compare disk performance.

D-Wave's Murray Thom discusses the present and future of quantum computing.

Quantum computing used to be an esoteric thought experiment for theoretical physicists, but now it is actually starting to happen. We spoke with Murray Thom of D-Wave, a company that is leading the way to this radical new vision.
Lead Image © Leo Blanchette, 123RF.com

Lead Image © Leo Blanchette, 123RF.com

Installing and operating the Graylog SIEM solution

Graylog security information and event management combines real-time monitoring and immediate notification of rule violations with long-term archiving for analysis and reporting.
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs



Support Our Work

ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.

Learn More”>
	</a>

<hr>		    
			</div>
		    		</div>

		<div class=