Articles

Lead Image © fourseasons, 123RF.com

Lead Image © fourseasons, 123RF.com

Security analysis with Microsoft Advanced Threat Analytics

Classic security safeguards, like antivirus and firewall products, are imperative for system protection. To search proactively for network intruders, as well, Microsoft offers Advanced Threat Analytics – a tool that will help even less experienced admins.
Lead Image © Boing, Photocase.com

Lead Image © Boing, Photocase.com

Encrypted backup with Duplicity

The free Duplicity backup program consistently encrypts all backups, which means that backups can even be stored in an insecure cloud.
Lead Image © SORAPONG CHAIPANYA, 123RF.com

Lead Image © SORAPONG CHAIPANYA, 123RF.com

Desired State Configuration for Linux

The combination of Open Management Infrastructure standards and the performance of Windows PowerShell opens new perspectives on heterogeneous networks, making PowerShell a realistic option as a management console for Unix and Linux.
Lead Image © lightwise, 123RF.com

Lead Image © lightwise, 123RF.com

MariaDB MaxScale: A smart proxy for MySQL

MaxScale by MariaDB is a smart proxy server for MySQL that speaks the same protocol as the database server. The manufacturer claims solid high availability and horizontal scalability.
Lead Image © Duncan Andison, 123RF.com

Lead Image © Duncan Andison, 123RF.com

New security features in Windows 10

With each version of Windows, Microsoft has expanded the built-in security functions. Windows 10 includes a number of new and interesting security features.
Lead Image © Fernando Gregory, 123RF.com

Lead Image © Fernando Gregory, 123RF.com

Freeing your data from ransomware

Cyber criminals don't need access to sensitive information to blackmail their victims. Simply encrypting everyday files can be enough to extort money from users, whose data is only unencrypted after they pay a ransom – and possibly not even then.
Lead Image © payphoto, 123RF.com

Lead Image © payphoto, 123RF.com

Integrating FreeIPA with Active Directory

Many companies use Active Directory for centrally managing existing systems, but if you mix in Linux systems, you have to take care of a few things, such as different forms of integration. We show you how to connect the FreeIPA identity management framework as an interface to an Active Directory domain.
Lead Image © Dmitry Pichugin, Fotolia.com

Lead Image © Dmitry Pichugin, Fotolia.com

Backups using rdiff-backup and rsnapshot

The easier you can back up and restore data, the better. Mature Linux tools show that performing regular, automated backups doesn't have to be a pain.
Lead Image © arsgera, 123RF.com

Lead Image © arsgera, 123RF.com

Linux Storage Stack

Abstraction layers are the alpha and omega in the design of complex architectures. The Linux Storage Stack is an excellent example of well-coordinated layers. Access to storage media is abstracted through a unified interface, without sacrificing functionality.
Lead Image © Juthamas Oonhawat, 123RF.com

Lead Image © Juthamas Oonhawat, 123RF.com

Network virtualization with OpenDaylight

OpenDaylight provides a flexible solution for setting up a software-defined networking environment. We show you how to get started.
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs



Support Our Work

ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.

Learn More”>
	</a>

<hr>		    
			</div>
		    		</div>

		<div class=