Articles

Lead Image © Duncan Andison, 123RF.com

Lead Image © Duncan Andison, 123RF.com

New security features in Windows 10

With each version of Windows, Microsoft has expanded the built-in security functions. Windows 10 includes a number of new and interesting security features.
Lead Image © Fernando Gregory, 123RF.com

Lead Image © Fernando Gregory, 123RF.com

Freeing your data from ransomware

Cyber criminals don't need access to sensitive information to blackmail their victims. Simply encrypting everyday files can be enough to extort money from users, whose data is only unencrypted after they pay a ransom – and possibly not even then.
Lead Image © payphoto, 123RF.com

Lead Image © payphoto, 123RF.com

Integrating FreeIPA with Active Directory

Many companies use Active Directory for centrally managing existing systems, but if you mix in Linux systems, you have to take care of a few things, such as different forms of integration. We show you how to connect the FreeIPA identity management framework as an interface to an Active Directory domain.
Lead Image © Dmitry Pichugin, Fotolia.com

Lead Image © Dmitry Pichugin, Fotolia.com

Backups using rdiff-backup and rsnapshot

The easier you can back up and restore data, the better. Mature Linux tools show that performing regular, automated backups doesn't have to be a pain.
Lead Image © arsgera, 123RF.com

Lead Image © arsgera, 123RF.com

Linux Storage Stack

Abstraction layers are the alpha and omega in the design of complex architectures. The Linux Storage Stack is an excellent example of well-coordinated layers. Access to storage media is abstracted through a unified interface, without sacrificing functionality.
Lead Image © Juthamas Oonhawat, 123RF.com

Lead Image © Juthamas Oonhawat, 123RF.com

Network virtualization with OpenDaylight

OpenDaylight provides a flexible solution for setting up a software-defined networking environment. We show you how to get started.
Lead Image © kangshutters, 123RF.com

Lead Image © kangshutters, 123RF.com

Monitoring containers

A monitoring system helps avoid unpleasant surprises during operations, but admins need to modify existing solutions to fit a containerized world.
Lead Image © Paul Herbert, 123RF.com

Lead Image © Paul Herbert, 123RF.com

Exploring dhcpy6d, a DHCP server for IPv6 networks

Even if you don't have to have DHCP on your IPv6 network, you might want it anyway. Dhcpy6d is a promising DHCP option for IPv6.
Lead Image © Jenzig, photocase.com

Lead Image © Jenzig, photocase.com

Ansible as an alternative to the Puppet configuration tool

Automation is part of life in the data center, and Puppet is commonly regarded as the King of the Hill, but some users prefer the lean alternative Ansible.
Lead Image © Wayne Daniels, 123RF.com

Lead Image © Wayne Daniels, 123RF.com

Web-based reconnaissance

The recon-ng web reconnaissance framework is an important tool in penetration testing.
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs



Support Our Work

ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.

Learn More”>
	</a>

<hr>		    
			</div>
		    		</div>

		<div class=