Articles

Lead Image © ginasanders, 123RF.com

Lead Image © ginasanders, 123RF.com

Protect privileged accounts in AD

Granular protection for highly privileged accounts is granted by the Protected Users group in Active Directory and Kerberos authentication policies.
Photo by Dane Deaner on Unsplash

Photo by Dane Deaner on Unsplash

Reducing the Windows 10 attack surface

Windows attack surface reduction policies make significant progress in protecting your entire IT infrastructure.
Photo by Wynand van Poortvliet on unsplash

Photo by Wynand van Poortvliet on unsplash

Grafana and Prometheus customized dashboards

Grafana analytics and visualization dashboards plus the Prometheus monitoring and alerting tool make possible extensive custom reporting and alerting systems.

Photo by Jan Schulz # Webdesigner Stuttgart

Cloud-native storage with OpenEBS

Software from the open source OpenEBS project provides a cloud-native storage environment that makes block devices available to individual nodes in the Kubernetes cluster.

Harden your Apache web server

Cyberattacks don't stop at the time-honored Apache HTTP server, but a smart configuration, timely updates, and carefully considered security strategies can keep it from going under.
Photo Johannes Plenio on Unsplash

Photo Johannes Plenio on Unsplash

Storage protocols for block, file, and object storage

The future of flexible, performant, and highly available storage.
Photo by Harry Cunningham on Unsplash

Photo by Harry Cunningham on Unsplash

IT automation with SaltStack

SaltStack is a fast and reliable modular toolbox written in Python that contains ready-made modules for many configuration management purposes.
Lead Image © alphaspirit, 123RF.com

Lead Image © alphaspirit, 123RF.com

Advanced MySQL security tips (a complete guide)

Security safeguards protect data on MySQL servers.
Photo by Craig Whitehead on Unsplash

Photo by Craig Whitehead on Unsplash

Protect Hyper-V with on-board resources

With the right settings and small tools, security in virtual environments can be increased significantly by tweaking the on-board tools.
Photo by Steve Harvey on Unsplash

Photo by Steve Harvey on Unsplash

Pattern matching dispute in Python 3.10

A controversial change is taking place in Python version 3.10 known mainly from functional languages: pattern matching.
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs



Support Our Work

ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.

Learn More”>
	</a>

<hr>		    
			</div>
		    		</div>

		<div class=