Articles
Finding Your Way Around a GPU-Accelerated Cloud Environment
We look at the tools needed to discover, configure, and monitor an accelerated cloud instance, employing the simplest possible tool to get the job done.
Pattern matching dispute in Python 3.10
A controversial change is taking place in Python version 3.10 known mainly from functional languages: pattern matching.
Protect Hyper-V with on-board resources
With the right settings and small tools, security in virtual environments can be increased significantly by tweaking the on-board tools.
Storage protocols for block, file, and object storage
The future of flexible, performant, and highly available storage.
Controlled container communication
Tune the iptables configuration for Docker by establishing your own forwarding rules.
Save sudo logs on a remote computer
One of the new features implemented in the current 1.9 version of the sudo tool is the ability to save sudo logs locally and on a remote computer.
Ransomware: Prepare for emergencies
The danger of ransomware attacks calls for a robust backup and monitoring strategy.
Secure passwordless logins with FIDO2 and LDAP
Log in to your account securely without a password with LDAP and a schema to establish the objects and attributes required for FIDO2 authentication.
Integrating Podman and systemd
With the integration of Podman and systemd, you can put any software inside a container under the control of systemd and see almost no difference between running the service directly on the host or inside a container.
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Most Popular
Support Our Work
ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.