Articles
Flexible backup for large-scale environments
Bacula is a powerful open source backup solution for large environments that offers automation, extension modules, and commercial support.
Supercharge your software upgrade routine
Topgrade steps forward as the hero to help you keep an upper hand over updating and upgrading your stable of Linux applications.
Managing infrastructure as code with Spacelift
The Spacelift infrastructure-as-code management platform quickly rolls out complete setups to the cloud, minimizing the possibility of failure and problems.
Managing GPT-4 on the Network
Now that Microsoft has integrated its GPT-4-based AI chat functions directly into the operating system with Windows Copilot, which now includes Bing Chat and Bing Chat Enterprise, you might want to know how to control or even block its use on the network.
Mocking and emulating AWS and GCP services
Mock and emulate AWS services locally and use official Google Cloud Platform service emulators to unblock development and operations – all without paying a dime.
Kubernetes networking in the kernel
Cilium and eBPF put Kubernetes networking down in the kernel where it belongs.
Security and automation with SBOMs
Already mandatory in the United States and recently approved in Europe thanks to new legislation, a software bill of materials provides information about software components, enabling IT managers to respond better to attacks and vulnerabilities.
Admin as a service with sysstat for ex-post monitoring
The top, vmstat, and iotop monitoring tools for Linux show the current situation but do not provide any information about the past – which is where sysstat comes into play.
Securing the container environment
Implement a good, robust defense with an in-depth strategy of applying multiple layers of security to all components, including the human factor.
Making Kerberoasting uneconomical
A method known as Kerberoasting is an exploitation technique of the Kerberos authentication protocol. We take a closer look at the available safeguards and detection measures against this attack.
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Most Popular
Support Our Work
ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.