Articles
eSIMs in the enterprise
In this overview, we look at the opportunities eSIM technology offers for the mobile workplace and what IT managers need to watch out for in deployment and management.
Detecting and analyzing man-in-the-middle attacks
Wireshark and a combination of tools comprehensively analyze your security architecture.
New features in Windows Terminal Preview
Windows Terminal Preview comes with interesting new features, such as state-preserving quick windows access via shortcuts and configuration of almost all settings in a GUI, which is reason enough to take a look at the preview.
Stretching devices with limited resources
Compressed memory solutions for small memory problems.
Attack and defense techniques
The MITRE ATT&CK and D3FEND knowledge databases provide useful techniques for securing your IT infrastructure.
Create secure simple containers with the systemd tools Nspawnd and Portabled
Systemd comes with two functions for container management that allow many programs to run more securely through isolation.
Workspace ONE for endpoint management
VMware Workspace ONE provides a secure and user-friendly digital workplace. We look at the features, components, and architecture of Workspace ONE, as well as application management and simplification of the integration of end devices through user self-enrollment.
Configuring X Window input and output devices
Two command-line tools, xandr and xinput, let you optimize your X Window display from the terminal.
Zero Trust as a security strategy
Acceptance of zero trust models like BeyondCorp by Google or LISA by Netflix lags in Europe, where endpoint security is king. We examine why this situation must change by looking into the principles of modern zero trust concepts.
Harden services with systemd
Systemd comes with a metric for determining the security of your system, letting you track how any service can be secured step-by-step in a sandbox.
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Most Popular
Support Our Work
ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.










