Articles

Lead Image © Maxim Borovkov, 123RF.com

Lead Image © Maxim Borovkov, 123RF.com

New features in PHP 8

After about two years of development, version 8 of the popular PHP scripting language has been released. It comes with a number of innovations and ditches some obsolete features
Lead Image © zelfit, 123RF.com

Lead Image © zelfit, 123RF.com

MinIO: Amazon S3 competition

MinIO promises no less than a local object store with a world-class S3 interface and features that even the original lacks.
Lead Image © Marcel Goldbach, photocase.com

Lead Image © Marcel Goldbach, photocase.com

Managing access credentials

Most Internet services require password-protected individual accounts. A password manager can help you keep track of all your access credentials.
Lead Image © bowie15, 123RF

Lead Image © bowie15, 123RF

Real-time log inspection

Teler is an intrusion detection and threat alert command-line tool that analyzes logs and identifies suspicious activity in real time.
Lead Image © Yewkeo, 123RF.com

Lead Image © Yewkeo, 123RF.com

Endlessh and tc tarpits slow down attackers

Keep an attacker's connections open in an Endlessh "tarpit" or delay incoming connections with the more traditional rate-limiting approach of tc.
Lead Image © Vlad Kochelaevskiy, 123RF.com

Lead Image © Vlad Kochelaevskiy, 123RF.com

Machine learning and security

Machine learning can address risks and help defend the IT infrastructure by strengthening and simplifying cybersecurity.
Lead Image © Kirsty Pargeter, 123RF.com

Lead Image © Kirsty Pargeter, 123RF.com

Single sign-on with Keycloak

Google and Facebook are two of the biggest providers for single sign-on on the web, with OAuth2 and OpenID, but if you don't want to put your customers' or employees' data in their hands, Red Hat's Keycloak software lets you run your own operations with the option of integrating existing Kerberos or LDAP accounts.

Secure passwordless logins with FIDO2 and LDAP

Log in to your account securely without a password with LDAP and a schema to establish the objects and attributes required for FIDO2 authentication.
Photo by Nick Fewings on Unsplash

Photo by Nick Fewings on Unsplash

Integrating Podman and systemd

With the integration of Podman and systemd, you can put any software inside a container under the control of systemd and see almost no difference between running the service directly on the host or inside a container.
Photo by Patrick Schneider on Unsplash

Photo by Patrick Schneider on Unsplash

Kafka: Scaling producers and consumers

A guide to 10x scaling in Kafka with real-world metrics for high throughput, low latency, and cross-geographic data movement.
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs



Support Our Work

ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.

Learn More”>
	</a>

<hr>		    
			</div>
		    		</div>

		<div class=