Articles
Ubuntu 16.04 LTS as an ownCloud server
Locally hosted collaboration servers are an alternative to letting employees swap files in a public cloud. We show you how to set up an ownCloud 9 environment on Ubuntu 16.04 LTS.
Discover ransomware with PowerShell
Simple backup strategies cannot protect files encrypted by ransomware, because they can be affected as well. A PowerShell script can ensure that your files are okay before sending them to backup.
Application Monitoring with openITCOCKPIT
A good monitoring solution must provide information about applications and their performance. We show you how to monitor a database using openITCOCKPIT.
Halting the ransomware blackmail wave
In the tsunami of ransomware infections this year, the Locky encryption trojan is a high-water mark. With a constant stream of novel attack patterns, this continually evolving pest makes life difficult for IT managers, users, and security vendors. Here's how to protect yourself.
Setting up MariaDB replication with the help of XtraBackup
If your database is so important that the content must not be lost between periodic data backups, replication is a possible solution. We describe how to set up replication for MariaDB with the aid of XtraBackup.
Keeping Docker containers safe
Docker containers introduce serious security problems, but you can employ a number of methods to deploy them securely.
Targeted attacks on companies
Watering hole and spear phishing targeted attacks offer the greatest rewards to cybercriminals. Here's how to protect your company from these types of attacks.
Network backups with Amanda
The free Amanda backup utility dates back to the days of tape drives, but it is still a powerful tool for centralized backup across the network.
New Exchange standard
Service Pack 1 for Exchange 2013 introduced a new protocol, which has become the default in Exchange 2016: MAPI over HTTP.
Safeguard and scale containers
Security, deployment, and updates for thousands of nodes prove challenging in practice, but with CoreOS and Kubernetes, you can orchestrate container-based web applications in large landscapes.
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Most Popular
Support Our Work
ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.