Articles

Photo by Valentina Curini on Unsplash

Photo by Valentina Curini on Unsplash

Mobile hacking tool

The Flipper Zero mobile hacking tool, a highly portable device that looks like a kiddy toy at first glance, can check a wide range of wireless connections for vulnerabilities. We take a look at potential applications in pentesting scenarios.
Lead Image © austler, 123RF.com

Lead Image © austler, 123RF.com

Kick-start your AI projects with Kubeflow

Training language models and AI algorithms requires a powerful infrastructure that is difficult to create manually. Although Kubeflow promises a remedy, it is itself a complex monster … unless you are familiar with the right approach that lets you get it up and running fairly quickly.
Photo by Geeky Shots on Unsplash

Photo by Geeky Shots on Unsplash

Run rootless Podman containers as  systemd services

Running rootless containers is easy with Podman. With Podman Quadlet files, these containers are seamlessly integrated into systemd services.
Lead Image © lightwise, 123RF.com

Lead Image © lightwise, 123RF.com

Acquiring a Memory Image

Be ready before disaster strikes. In this article we describe some tools you should have on hand to obtain a memory image of an infected system.
Lead Image © Dmitriy Cherevko, 123RF.com

Lead Image © Dmitriy Cherevko, 123RF.com

New versions of the Endian and Sophos UTM solutions

UTM systems combat all kinds of dangers under the policy of Unified Threat Management. The demands and expectations of customers fuel competition. Two of the most popular manufacturers – Endian and Sophos – have now released new versions of their solutions.
Lead Image © Sorin Colac, 123RF.com

Lead Image © Sorin Colac, 123RF.com

Documentation Tools for Admins

Scattered documents lying on the file server are an inconvenient resource when admins need to solve problems at the help desk. Free knowledgebase components combine knowledge and structure, providing a better overview.
Lead Image © Christos Georghiou, 123RF.com

Lead Image © Christos Georghiou, 123RF.com

Monitoring with collectd 4.3

Collectd 4.3 is a comprehensive monitoring tool with a removable plugin architecture.
Lead Image © ping han, 123RF.com

Lead Image © ping han, 123RF.com

Container Virtualization Comeback with Docker

Docker helps the Linux container achieve an appealing comeback and integrates some features missing from earlier container solutions.
Lead Image © gepard1979, 123RF.com

Lead Image © gepard1979, 123RF.com

IPv6 Tables

We design a basic set of ip6tables rules for an IPv6 firewall.
Lead Image © raptorcaptor, 123RF.com

Lead Image © raptorcaptor, 123RF.com

Malware Analysis

We show you how to dig deep to find hidden and covert processes, clandestine communications, and signs of misconduct on your network.
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs



Support Our Work

ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.

Learn More”>
	</a>

<hr>		    
			</div>
		    		</div>

		<div class=