Articles

Photo by Nathan Roser on Unsplash

Photo by Nathan Roser on Unsplash

Optimizing domain controller security

Configure your domain controller security settings correctly with Policy Analyzer and current Microsoft baselines for a leak-tight Active Directory.
Photo by Ray Hennessy on Unsplash

Photo by Ray Hennessy on Unsplash

Migrate your Git repositories to Gitea

Nothing is forever, not even a Git server. After the purchase of GitHub by Microsoft, I found a new home in Gitea for version control.
Lead Image © Kittipong Jirasukhanont, 123RF.com

Lead Image © Kittipong Jirasukhanont, 123RF.com

Explore automation-as-code with Ansible

The Ansible automation tool makes it really easy to implement IT scenarios as code. We use structured YAML code to roll out Ansible in the form of AWX.
Lead Image © rudall30, 123RF.com

Lead Image © rudall30, 123RF.com

File Integrity Checks with AIDE

If an attacker gains access to systems by working around your defenses, you need to discover the attacker's tracks in good time, at least to mitigate the further risk of damage. We show you how to monitor changes to files with the Linux AIDE tool.
Photo by ROCCO STOPPOLONI on Unsplash

Photo by ROCCO STOPPOLONI on Unsplash

Getting your virtual machine dimensions right

Massive, performance-hungry VMs require proper handling to meet their dynamic requirements. We give you some rules to help size these monsters properly.
Lead Image ©pakhnyushchyy, 123RF.com

Lead Image ©pakhnyushchyy, 123RF.com

Networking strategies for Linux on Azure

We explore advanced networking strategies tailored for Linux workloads on Azure.
Lead Image © Goran Bogicevic, Fotolia.com

Lead Image © Goran Bogicevic, Fotolia.com

Production-ready mini-Kubernetes installations

Kubernetes can be highly complex, with massive setup routines that are totally over the top for newcomers. If you want to try out Kubernetes or run it in production, you have a number of options, even if you decide not to use the comprehensive packages from established vendors.
Lead Image © shutter999, 123RF.com

Lead Image © shutter999, 123RF.com

Hardening SSH authentication to the max

Public key authentication further supplemented with one-time password or hardware authentication methods improves SSH security while offering genuine convenience.
Photo by Gabriel Crismariu on Unsplash

Photo by Gabriel Crismariu on Unsplash

Microsoft Exchange replacement

Grommunio is setting itself up as an open source drop-in replacement for Microsoft Exchange.
Photo by Alex Kondratiev on Unsplash

Photo by Alex Kondratiev on Unsplash

Test your containers with the Docker Desktop one-node cluster

The built-in single-node Kubernetes cluster included with Docker Desktop is a handy tool for testing your container.
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs



Support Our Work

ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.

Learn More”>
	</a>

<hr>		    
			</div>
		    		</div>

		<div class=