Articles

Lead Image © Christos Georghiou, 123RF.com

Lead Image © Christos Georghiou, 123RF.com

Manipulation detection with AFICK

AFICK is a small, free tool that helps administrators detect attempts to manipulate documents and system files.
Lead Image © Alexey Shkitenkov, Fotolia.com

Lead Image © Alexey Shkitenkov, Fotolia.com

A service mesh for microarchitecture components

Istio facilitates communication between the many small microcomponents that need to communicate with each other in modern applications.
Lead Image © stillfx, 123RF.com

Lead Image © stillfx, 123RF.com

Cron alternatives fcron and hcron

The fcron and hcron scheduler alternatives to cron are suitable for computers that do not run around the clock, and each come with specific benefits.
Lead Image © Pavol Stredansky

Lead Image © Pavol Stredansky

Transcoding optical media in Linux

We test two candidates for viewing and converting video DVDs and Blu-ray discs, HandBrake and MakeMKV, and point out legal hurdles.
Photo by Christin Hume on Unsplash

Photo by Christin Hume on Unsplash

Container IDE with cloud connection

Gitpod relies on technologies such as Docker and Eclipse Theia to serve up individual development environments for GitHub projects.
Lead Image © Gino Santa Maria, 123RF.com

Lead Image © Gino Santa Maria, 123RF.com

Storage monitoring with Grafana

Create intuitive and meaningful visualizations of storage performance values with a "TIG" stack: Telegraf, InfluxDB, and Grafana.
Lead Image © Dioptria, sxc.hu

Lead Image © Dioptria, sxc.hu

New ITIL framework and certification

ITIL version 4.0 has undergone a fundamental revision and is now headed into the age of the cloud and DevOps.
Lead Image © yemelyanov, 123RF.com

Lead Image © yemelyanov, 123RF.com

Call web pages in the terminal with Browsh

The Browsh command-line browser displays web pages with text characters and thus supports true-to-layout browsing at the command line.
Lead Image © higyou, 123RF.com

Lead Image © higyou, 123RF.com

Internet socket programming in Perl

Perl sockets work like file handles that can span across a network or the entire Internet.
Lead Image © Lucy Baldwin, 123RF.com

Lead Image © Lucy Baldwin, 123RF.com

Thrashing the data cache for fun and profit

To reduce the possibility of disk thrashing, optimize your data cache through spatial locality and cache-friendly algorithms and utilize fully the data loaded from slower storage media before moving on.
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs



Support Our Work

ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.

Learn More”>
	</a>

<hr>		    
			</div>
		    		</div>

		<div class=