Articles

Lead Image © Sergey Nivens, 123RF.com

Lead Image © Sergey Nivens, 123RF.com

Putting an Active Directory domain controller in the Azure cloud

Once you start putting services in Azure cloud, you might want to add an Active Directory domain controller.
Lead Image © Maxim Kazmin, 123RF.com

Lead Image © Maxim Kazmin, 123RF.com

Segmenting networks with VLANs

Network virtualization takes very different approaches at the software and hardware levels to divide or group network resources into logical units independent of the physical layer. It is typically a matter of implementing secure strategies. We show the technical underpinnings of VLANs.
Lead Image © Jakub Jirsak, 123RF.com

Lead Image © Jakub Jirsak, 123RF.com

SDS configuration and performance

Software-defined storage promises centrally managed, heterogeneous storage with built-in redundancy. We examine how complicated it is to set up the necessary distributed filesystems. A benchmark shows which operations each system is best at tackling.
Lead Image © Krockenmitte, photocase.com

Lead Image © Krockenmitte, photocase.com

Finally: Java 9

Java 9 tempts programmers with innovations intended to facilitate the development and operation of Java applications.
Lead Image © Dmitriy Shironosov, 123RF.com

Lead Image © Dmitriy Shironosov, 123RF.com

Ubuntu 16.04 LTS as an ownCloud server

Locally hosted collaboration servers are an alternative to letting employees swap files in a public cloud. We show you how to set up an ownCloud 9 environment on Ubuntu 16.04 LTS.
Lead Image © Andrea Danti, 123RF.com

Lead Image © Andrea Danti, 123RF.com

Discover ransomware with PowerShell

Simple backup strategies cannot protect files encrypted by ransomware, because they can be affected as well. A PowerShell script can ensure that your files are okay before sending them to backup.
Lead Image © Author, 123RF.com

Lead Image © Author, 123RF.com

Application Monitoring with openITCOCKPIT

A good monitoring solution must provide information about applications and their performance. We show you how to monitor a database using openITCOCKPIT.
Lead Image © sandra zuerlein, fotolia.com

Lead Image © sandra zuerlein, fotolia.com

Halting the ransomware blackmail wave

In the tsunami of ransomware infections this year, the Locky encryption trojan is a high-water mark. With a constant stream of novel attack patterns, this continually evolving pest makes life difficult for IT managers, users, and security vendors. Here's how to protect yourself.
Lead Image © Kran Kanthawong, 123RF.com

Lead Image © Kran Kanthawong, 123RF.com

Setting up MariaDB replication with the help of XtraBackup

If your database is so important that the content must not be lost between periodic data backups, replication is a possible solution. We describe how to set up replication for MariaDB with the aid of XtraBackup.
Lead Image © Irina Tischenko, 123RF.com

Lead Image © Irina Tischenko, 123RF.com

Keeping Docker containers safe

Docker containers introduce serious security problems, but you can employ a number of methods to deploy them securely.
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs



Support Our Work

ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.

Learn More”>
	</a>

<hr>		    
			</div>
		    		</div>

		<div class=