Articles

Photo by Oudom Pravat on Unsplashx

Photo by Oudom Pravat on Unsplashx

Managing network connections in container environments

Traefik promises not only to manage mesh implementations for container environments reliably, but to do so in a way that makes them enjoyable to administer.
Photo by Michael Geiger on Unsplash

Photo by Michael Geiger on Unsplash

Ransomware: Prepare for emergencies

The danger of ransomware attacks calls for a robust backup and monitoring strategy.
Lead Image © Guido Vrola, 123RF.com

Lead Image © Guido Vrola, 123RF.com

Professional protection for small and mid-size enterprises

To what extent does the Untangle NG Firewall, where apps come together like pieces of a jigsaw, meet customer criteria for protection, usability, price, and support?
Photo by the blowup on Unsplash

Photo by the blowup on Unsplash

Save sudo logs on a remote computer

One of the new features implemented in the current 1.9 version of the sudo tool is the ability to save sudo logs locally and on a remote computer.
Lead Image © Lucy Baldwin, 123RF.com

Lead Image © Lucy Baldwin, 123RF.com

Finding Your Way Around a GPU-Accelerated Cloud Environment

We look at the tools needed to discover, configure, and monitor an accelerated cloud instance, employing the simplest possible tool to get the job done.

Controlled container communication

Tune the iptables configuration for Docker by establishing your own forwarding rules.
Lead Image © zelfit, 123rf.com

Lead Image © zelfit, 123rf.com

Shadow admin permissions and your AWS account

Malicious attackers are trying to conquer your AWS castle in the cloud. To mount a strong defense, you'll need a deeper understanding of privilege escalation and shadow admin permissions.
Lead Image © alphaspirit, 123RF.com

Lead Image © alphaspirit, 123RF.com

HTTP/1.1 versus HTTP/2 and HTTP/3

HTTP/2 introduced multiplexing, resulting in superior bandwidth utilization over HTTP/1.1, and HTTP/3 solves the problem of transmission delays from packet loss by replacing TCP with QUIC.
Lead Image © Vladimir Nenov, 123RF.com

Lead Image © Vladimir Nenov, 123RF.com

Unleashing Accelerated Speeds with RAM Drives

Enable and share performant block devices across a network of compute nodes with the RapidDisk kernel RAM drive module.
Photo by Jorge Fernández Salas on Unsplash

Photo by Jorge Fernández Salas on Unsplash

Best practices for secure script programming

The lax syntax verification of shell scripts and a lack of attention to detail in programming can create impressively dangerous security vulnerabilities.
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs



Support Our Work

ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.

Learn More”>
	</a>

<hr>		    
			</div>
		    		</div>

		<div class=