Articles

Lead Image © Lucy Baldwin, 123RF.com

Lead Image © Lucy Baldwin, 123RF.com

An army of Xeon cores to do your bidding

Explore low-cost parallel computing.
Photo by Rayner Simpson on Unsplash

Photo by Rayner Simpson on Unsplash

Intrusion Detection with OSSEC

The OSSEC free intrusion detection and host-based intrusion prevention system detects and fixes security problems in real time at the operating system level with functions such as log analysis, file integrity checks, Windows registry monitoring, and rootkit detection. It can be deployed virtually anywhere and supports the Linux, Windows, and macOS platforms.

Building a defense against DDoS attacks

Targeted attacks such as distributed denial of service, with thousands of computers attacking your servers until one of them caves in, cannot be prevented, but they can be effectively mitigated.
Photo by Stoochi Lam on Unsplash

Photo by Stoochi Lam on Unsplash

Centralized monitoring and intrusion detection

Security Onion bundles numerous individual Linux tools that help you monitor networks or fend off attacks to create a standardized platform for securing IT environments.
Lead Image © lexandersikovl, 123RF.com

Lead Image © lexandersikovl, 123RF.com

Chatbots put to the scripting test

The AI skillset is currently limited, so you don't yet have to worry about AI replacing programmers. We look at the capabilities of AI scripting with free large language models and where it works best.
Lead Image © limbi007, 123RF.com

Lead Image © limbi007, 123RF.com

Secure Kubernetes with Kubescape

Kubescape checks Kubernetes container setups for security and compliance issues, making life easier for administrators.
Photo by Karsten Würth on Unsplash

Photo by Karsten Würth on Unsplash

Self-hosted remote support

RustDesk supports self-hosted cross-platform remote support and maintenance. The client and optional basic server are open source and available free of charge.
Lead Image © grafner, 123RF.com

Lead Image © grafner, 123RF.com

Simple, small-scale Kubernetes distributions for the edge

We look at three scaled-down, compact Kubernetes distributions for operation on edge devices or in small branch office environments.
Photo by John Cameron on Unsplash

Photo by John Cameron on Unsplash

Fight Windows ransomware with on-board tools

Ransomware defense involves two strategies: identifying attacks and slowing the attackers to mitigate their effects.
Lead Image © Aleksey Mnogosmyslov, 123RF.com

Lead Image © Aleksey Mnogosmyslov, 123RF.com

DevSecOps with DefectDojo

The DefectDojo vulnerability management tool helps development teams and admins identify, track, and fix vulnerabilities early in the software development process.
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs



Support Our Work

ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.

Learn More”>
	</a>

<hr>		    
			</div>
		    		</div>

		<div class=