Articles
Targeted attacks on companies
Watering hole and spear phishing targeted attacks offer the greatest rewards to cybercriminals. Here's how to protect your company from these types of attacks.
Network backups with Amanda
The free Amanda backup utility dates back to the days of tape drives, but it is still a powerful tool for centralized backup across the network.
New Exchange standard
Service Pack 1 for Exchange 2013 introduced a new protocol, which has become the default in Exchange 2016: MAPI over HTTP.
Safeguard and scale containers
Security, deployment, and updates for thousands of nodes prove challenging in practice, but with CoreOS and Kubernetes, you can orchestrate container-based web applications in large landscapes.
Hyper-V containers with Windows Server 2016
The release of Windows Server 2016 also heralds a new version of Hyper-V, with improved cloud security, flexible virtual hardware, rolling upgrades of Hyper-V clusters, and production checkpoints.
A script for strict packet filter updates
Automatically create restrictive rules in Linux iptables packet filters.
Writing SELinux modules
Much has happened in the field of SELinux in the last few years, including the development of new usability features. The current release makes it easier to write SELinux policy modules yourself.
Exploring OpenStack's Trove DBaaS
DBaaS moves the database service to the cloud, promising a new database instance at the click of a mouse.
Proactive Monitoring
System administrators usually take action after monitoring software indicates the failure of a service or server. In contrast to this reactive approach, a proactive monitoring solution with Riemann allows admins to detect problems in advance.
Countering embedded malware attacks
With the resurgence of sophisticated macro virus attacks, new countermeasures are in order. We offer a few recommendations.
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Most Popular
Support Our Work
ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.