Articles
Accelerated and targeted search and find with Ripgrep
Ripgrep combines the best features of tools like Grep, Ack, and Silver Searcher when it comes to using search patterns in a terminal window.
Incident response with Velociraptor
The software incarnation of the feared predator in the Jurassic Park movies has been on the hunt for clues to cyberattacks and indicators of compromise. We show you how to tame the beast and use it for your own purposes.
Native serverless computing in Kubernetes
Knative transfers serverless workloads to Kubernetes and provides all the container components you need to build serverless applications and PaaS and FaaS services.
Sharding and scale-out for databases
Apache ShardingSphere extends databases like MySQL or PostgreSQL, adding a modular abstraction layer to support horizontal sharding and scalability – but not replication or encryption at rest.
What's your status (page)?
Businesses with modern IT infrastructures can keep track of internal and external servers and services with black box monitoring by Monitoror, Vigil, and Statping-ng.
Build and host Docker images
When facing the challenge of packaging your application in a container, take into account your needs in terms of handling and security and investigate sensible options for hosting your own registry.
Recovering from a cyberattack in a hybrid environment
Restoring identity is an important part of disaster recovery, since it lays the foundation for restoring normality and regular operations. We look into contingency measures for hybrid directory services with Entra ID, the Graph API, and its PowerShell implementation.
Automatically terminate OpenSSH sessions
Disconnect OpenSSH user sessions after a certain period of inactivity with the systemd-logind service.
Fast email server deployments with iRedMail
Setting up and maintaining an email service in the data center doesn't have to be a nightmare. The iRedMail open source solution lets you deploy a full-featured email server on a number of platforms in a matter of minutes.
Border Gateway Protocol
We look at the Border Gateway Protocol, how it routes packets through the Internet, its weaknesses, and some hardening strategies.
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Most Popular
Support Our Work
ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.
