Articles

Photo by Nils Bouillard on Unsplash

Photo by Nils Bouillard on Unsplash

Flexible backup for large-scale environments

Bacula is a powerful open source backup solution for large environments that offers automation, extension modules, and commercial support.
Lead Image © Tjefferson, Fotolia.com

Lead Image © Tjefferson, Fotolia.com

Security and automation with SBOMs

Already mandatory in the United States and recently approved in Europe thanks to new legislation, a software bill of materials provides information about software components, enabling IT managers to respond better to attacks and vulnerabilities.
Lead Image © Levente Janos, 123RF.com

Lead Image © Levente Janos, 123RF.com

Admin as a service with sysstat for ex-post monitoring

The top, vmstat, and iotop monitoring tools for Linux show the current situation but do not provide any information about the past – which is where sysstat comes into play.
Lead Image © zeferli, 123RF.com

Lead Image © zeferli, 123RF.com

Securing the container environment

Implement a good, robust defense with an in-depth strategy of applying multiple layers of security to all components, including the human factor.
Lead Image © alphaspirit, 123RF.com

Lead Image © alphaspirit, 123RF.com

Making Kerberoasting uneconomical

A method known as Kerberoasting is an exploitation technique of the Kerberos authentication protocol. We take a closer look at the available safeguards and detection measures against this attack.
Photo by Alexander Grey on Unsplash

Photo by Alexander Grey on Unsplash

Encrypting DNS traffic on Linux with DoT

Prevent attackers from spying on DNS communication or manipulating responses by encrypting your DNS traffic on Linux with the DNS-over-TLS standard and the help of systemd-resolved.
Lead Image © Maxim Basinski, 123RF.com

Lead Image © Maxim Basinski, 123RF.com

Artificial admin

AIOps brings artificial intelligence tools into everyday administrative work, with AI-supported automation of some admin responsibilities.
Photo by Claudio Schwarz on Unsplash

Photo by Claudio Schwarz on Unsplash

RFID technologies and risks

We look at various approaches to RFID asset tracking, provide an understanding of the technologies and challenges involved, and cover some of the potential attack vectors.
Lead Image © Akurhan, 123RF.com

Lead Image © Akurhan, 123RF.com

Manage software apps publicly and privately

The WinGet client for the Windows Package Manager improves the software installation experience for administrators, developers, and users and provides a way to create and share software in the WinGet package format for publishing to public and private repos.
Lead Image © lexandersikovl, 123RF.com

Lead Image © lexandersikovl, 123RF.com

Chatbots put to the scripting test

The AI skillset is currently limited, so you don't yet have to worry about AI replacing programmers. We look at the capabilities of AI scripting with free large language models and where it works best.
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs



Support Our Work

ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.

Learn More”>
	</a>

<hr>		    
			</div>
		    		</div>

		<div class=