Articles

Lead Image Photo by Simeon Jacobson on Unsplash

Lead Image Photo by Simeon Jacobson on Unsplash

Improved defense through pen testing

Discover indicators of compromise with open source pen testing tools.
Photo by Damon Lam on Unsplash

Photo by Damon Lam on Unsplash

Open source multipoint VPN with VyOS

The VyOS Linux distribution puts network routing, firewall, and VPN functionality together and presents a fully working dynamic multipoint VPN router as an alternative or addition to a Cisco DMVPN mesh.
Lead Image © Andre Zhak, 123RF.com

Lead Image © Andre Zhak, 123RF.com

Debugging Bash scripts automatically

We look at various extension frameworks that make the life of developers and administrators easier when debugging a script.
Lead Image © Andrea De Martin, 123RF.com

Lead Image © Andrea De Martin, 123RF.com

Workflow-based data analysis with KNIME

They say data is "the new oil," but all that data you collect is only valuable if it leads to new insights. An open source analysis tool called KNIME lets you analyze data through graphical workflows – without the need for programming or complex spreadsheet manipulation.
Lead Image © efks, 123RF.com

Lead Image © efks, 123RF.com

Cloud-native storage for Kubernetes with Rook

Kubernetes is known to be inflexible when it comes to persistent storage, but Rook now offers cloud-native storage and seeks to achieve harmony.
Lead Image © Peapop, Fotolia.com

Lead Image © Peapop, Fotolia.com

Migrate your workloads to the cloud

Move a workload to the cloud without trouble, and leverage cloud benefits for a conventional setup.
Lead Image © krisckam, 123RF.com

Lead Image © krisckam, 123RF.com

The AWS CDK for software-defined deployments

Cloudy with a chance of better provisioning tools: The new Amazon Web Services Cloud Development Kit adds a powerful new tool to the DevOps toolkit.
Lead Image © Bruce Rolff, 123RF.com

Lead Image © Bruce Rolff, 123RF.com

Forensic main memory analysis with Volatility

When you examine the memory of a computer after a break-in, take advantage of active support from the Volatility framework to analyze important memory structures and read the volatile traces of an attack.
Photo by Geran de Klerk on Unsplash

Photo by Geran de Klerk on Unsplash

Cyber security for the weakest link

The balance between IT threats and IT security is woefully unbalanced in a Windows environment, requiring the enforcement of company-wide security standards.
Photo by Rock'n Roll Monkey on Unsplash

Photo by Rock'n Roll Monkey on Unsplash

The new version of Chef Automate comes with many new features

Chef, one of the oldest automation solutions, seeks to become a universal administration robot for cloud environments with new version 2.0.
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs



Support Our Work

ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.

Learn More”>
	</a>

<hr>		    
			</div>
		    		</div>

		<div class=