Articles
Google Cloud Storage for backups
We compare Google Cloud Storage for Internet-based backups with Amazon S3.
Credential harvesting at the network interstice
To thwart credential harvesters at the network interstice, you must understand how attackers exploit browser transactions.
The new OpenShift version 4
Red Hat launched the brand new OpenShift 4 with a number of changes that might suggest upgrading or even getting your feet wet if you've stayed out of the pool so far.
Enlarging the TCP initial window
Linux on-board resources let admins open the floodgates for high-volume TCP packages.
Manage OpenVPN keys with Easy-RSA
The Easy-RSA tool that comes with OpenVPN provides trouble-free open source PKI management.
Troubleshooting and analyzing VoIP networks
A special VoIP analyzer lets you control the available bandwidth and quality of voice transmission by monitoring relevant network parameters.
Protect Azure resources with Network Security Groups
Security segmentation into zones has long been the norm in data centers. Microsoft Azure Network Security Groups offers this kind of granular defense-in-depth security, including multilevel configuration of access rules.
OCI containers with Podman
The Podman alternative to Docker is a daemonless container engine with a run time that executes on request in root or user mode.
Domain name resolution with DNS over HTTPS
The new DNS over HTTPS standard from the Internet Engineering Task Force is meant to eliminate some of the known vulnerabilities of the Domain Name System.
Getting started with the Apache Cassandra database
The open source Apache Cassandra database claims to be fail-safe, economical, highly scalable, and easy to manage. A few exercises show whether it lives up to its advertising.
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Most Popular
Support Our Work
ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.