Articles
Building a low-powered NAS
Build a network-attached storage box with Rockstor to manage your data.
Identity Governance regulates access control in Azure AD
Azure Active Directory Identity Governance brings security processes to organizations with users who access resources or collaborate with partners in the cloud.
Solving the security problems of encrypted DNS
DNS encryption offers WiFi users good protection in public spaces; however, in the enterprise, it prevents the evaluation and filtering of name resolution.
Windows Admin Center for managing servers and clients
Windows Admin Center consolidates Windows Server admin tools into a browser-based remote management app for physical, virtual, and on-premises servers, although it does not yet fully replace Server Manager.
Reducing your attack surface
Windows Defender Application Control protects systems against threats that traditional virus scanners and signature-based mechanisms cannot detect by restricting applications in the user context and reducing the code allowed in the system kernel.
Setting up DevOps Orchestration Platform
DevOps Orchestration Platform open source framework was developed in Golang and can be used to bootstrap an IT infrastructure dynamically or import details of an existing IT infrastructure locally on VirtualBox or in the Cloud.
Interview with the MariaDB Foundation board Chairman Eric Herman
Eric Herman, Chairman of the MariaDB Foundation board, sheds light on the evolving focus of the custodians of one of the most popular and widely used databases.
Cloud-native application bundles for easy container deployment
Cloud-native application bundles are an easy option for distributing applications in a microservice architecture.
Mesh Service for OSI Layers 2 and 3
In early April 2018, the Cloud Native Computing Foundation accepted a new sandboxing project: Network Service Mesh. In this article, we explain how it resembles a conventional service mesh and what makes it different.
OPNids: Suricata with built-in machine learning
Does OPNids combine the Suricata IDS with machine learning to detect attack threats automatically, as advertised?
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Most Popular
Support Our Work
ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.
