Articles

Lead Image © reddogs, 123RF.com

Lead Image © reddogs, 123RF.com

Use PowerShell to manage Exchange Online

Exchange Online in Office 365 can be managed just like its local counterpart with similar, sometimes identical, PowerShell cmdlets.
Lead Image © Franck Boston, Fotolia.com

Lead Image © Franck Boston, Fotolia.com

Export and analyze Azure AD sign-in and audit logs

The relevant sign-in and audit logs in Azure Active Directory can be exported to external data sources to provide not only long-term archiving, but also the freedom to analyze the stored data.
Lead Image © Petr Vaclavek, 123RF.com

Lead Image © Petr Vaclavek, 123RF.com

Secure your data channel with stunnel

Stunnel provides a TLS wrapper with extensive configuration options to secure your data over insecure wireless networks.
Lead Image © Freya Sapphire, Photocase.com

Lead Image © Freya Sapphire, Photocase.com

Stressing security with PowerShell

PowerShell is not the usual go-to tool for pentesting, but it can reveal IT vulnerabilities that suggest a more considered use of the tool.
Photo by Kenney Badboy on Unsplash

Photo by Kenney Badboy on Unsplash

Microsoft PowerToys for Windows 10

This collection of free tools helps you customize Windows 10 for individual workflows.
Lead Image © braverabbit; 123RF.com

Lead Image © braverabbit; 123RF.com

An overview of the Citadel BBS

Citadel is a free, compact bulletin board system that integrates email, calendar, address book, and forum functions for administrators and hobbyists that need a groupware solution for a small organization.
Lead Image © victor zastolskiy, 123RF.com

Lead Image © victor zastolskiy, 123RF.com

Elephant Shed PostgreSQL appliance

The Elephant Shed PostgreSQL appliance bundles and integrates the components needed to manage a PostgreSQL server.
Lead Image © leeavison, 123RF.com

Lead Image © leeavison, 123RF.com

Run TensorFlow models on edge devices

TensorFlow Lite on a mobile device predicts harvest time for a real-world vertical farming operation.
Lead Image © Ildar Galeev, 123RF.com

Lead Image © Ildar Galeev, 123RF.com

Network traffic utilities bandwhich and iftop

A close look at the network traffic on a server with the bandwhich and iftop utilities can reveal exactly why an application is behaving strangely.
Lead Image © Daniel Schönen, photocase.com

Lead Image © Daniel Schönen, photocase.com

WiFi 6 in the Enterprise

The 802.11ax WiFi 6 standard uses LTE technology to solve the congestion problems experienced with older standards.
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs



Support Our Work

ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.

Learn More”>
	</a>

<hr>		    
			</div>
		    		</div>

		<div class=