Articles

Photo by USGS on Unsplash

Photo by USGS on Unsplash

Hacking Mutillidae II

Ethical hacking against the Mutillidae II vulnerable application can improve your security knowledge.
Lead Image © Sergii_Figurnyi, 123RF.com

Lead Image © Sergii_Figurnyi, 123RF.com

Improved visibility on the network

OpenNMS collects and visualizes flows so you can discover which network devices communicate with each other and the volume of data transferred.

A modern logging solution

As systems grow more complex and distributed, managing and making sense of logs used for monitoring, debugging, and troubleshooting can become a daunting task. Fluentd and its lighter counterpart Fluent Bit can help you unify data collection and consumption to make sense of logging data.
Photo by Michael D on Unsplash

Photo by Michael D on Unsplash

Secure and seamless server access

The powerful Cloudflare Tunnel provides secure and seamless access to servers and applications, making it a convenient alternative to VPN for any modern IT infrastructure.
Photo by Hassan Pasha on Unsplash

Photo by Hassan Pasha on Unsplash

Sustainable Kubernetes with Project Kepler

Measure, predict, and optimize the carbon footprint of your containerized workloads.
Photo by Domenico Loia on Unsplash

Photo by Domenico Loia on Unsplash

What's new in Ceph

Ceph and its core component RADOS have recently undergone a number of technical and organizational changes. We take a closer look at the benefits that the move to containers, the new setup, and other feature improvements offer.
Photo by Sudhith Xavier on Unsplash

Photo by Sudhith Xavier on Unsplash

A watchdog for every modern *ix server

Monit is a lightweight, performant, and seasoned solution that you can drop into old running servers or bake into new servers for full monitoring and proactive healing.
Photo by Kenneth Berrios Alvarez on Unsplash

Photo by Kenneth Berrios Alvarez on Unsplash

Response automation with Shuffle

The concept of security orchestration, automation, and response (SOAR) is increasingly important in IT security to counter ever-growing threats. We introduce Shuffle, a tool that lets you define automated workflows that boost infrastructure security.
Lead Image © Oleksandr Omelchenko, 123RF.com

Lead Image © Oleksandr Omelchenko, 123RF.com

Link Encryption with MACsec

MACsec encrypts defined links with high performance and secures Layer 2 protocols between client and switch or between two switches.
Lead Image © Peapop, Fotolia.com

Lead Image © Peapop, Fotolia.com

Low-code development with Microsoft Power Apps

If the IT staff is having trouble keeping up with the demand for custom applications, end users can pitch in with low-code programming tools like Microsoft Power Apps.
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs



Support Our Work

ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.

Learn More”>
	</a>

<hr>		    
			</div>
		    		</div>

		<div class=