Articles

Photo by redcharlie on Unsplash

Photo by redcharlie on Unsplash

Supercharge your software upgrade routine

Topgrade steps forward as the hero to help you keep an upper hand over updating and upgrading your stable of Linux applications.
Photo by Cécile Brasseur on Unsplash

Photo by Cécile Brasseur on Unsplash

Managing GPT-4 on the Network

Now that Microsoft has integrated its GPT-4-based AI chat functions directly into the operating system with Windows Copilot, which now includes Bing Chat and Bing Chat Enterprise, you might want to know how to control or even block its use on the network.
Lead Image © asphoto777, 123RF.com

Lead Image © asphoto777, 123RF.com

Setting up secure RDP connections

Know when to make RDP available on the Internet for remote access to Windows Server and how to configure connections securely when you do.
Photo by Nils Bouillard on Unsplash

Photo by Nils Bouillard on Unsplash

Flexible backup for large-scale environments

Bacula is a powerful open source backup solution for large environments that offers automation, extension modules, and commercial support.
Lead Image © Konstantin Shaklein, 123RF.com

Lead Image © Konstantin Shaklein, 123RF.com

Managing infrastructure as code with Spacelift

The Spacelift infrastructure-as-code management platform quickly rolls out complete setups to the cloud, minimizing the possibility of failure and problems.
Photo by Austin Distel on Unsplash

Photo by Austin Distel on Unsplash

Manage status messages in CouchDB with MapReduce

CouchDB offers numerous interesting features for acquisition and filtering of status messages that make it a fast and convenient data storage solution.
Lead Image © magiceyes, 123RF.com

Lead Image © magiceyes, 123RF.com

Zero trust planning and implementation

The many facets of the zero trust implementation process can be a source of frustration, which is why we offer a step-by-step guide to implementing zero trust models to help you make state-of-the-art IT security become a reality.
Lead Image © rudall30, 123RF.com

Lead Image © rudall30, 123RF.com

File Integrity Checks with AIDE

If an attacker gains access to systems by working around your defenses, you need to discover the attacker's tracks in good time, at least to mitigate the further risk of damage. We show you how to monitor changes to files with the Linux AIDE tool.
Lead Image © Kittipong Jirasukhanont, 123RF.com

Lead Image © Kittipong Jirasukhanont, 123RF.com

Explore automation-as-code with Ansible

The Ansible automation tool makes it really easy to implement IT scenarios as code. We use structured YAML code to roll out Ansible in the form of AWX.
Photo by ROCCO STOPPOLONI on Unsplash

Photo by ROCCO STOPPOLONI on Unsplash

Getting your virtual machine dimensions right

Massive, performance-hungry VMs require proper handling to meet their dynamic requirements. We give you some rules to help size these monsters properly.
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs



Support Our Work

ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.

Learn More”>
	</a>

<hr>		    
			</div>
		    		</div>

		<div class=