Articles
How to Hide a Malicious File
The best way to stop an attack is to think like an attacker. We’ll show you how to use the Metasploit framework to create a malicious payload that escapes antivirus detection.
ownCloud
ownCloud is an alternative to the many online storage services whose data protection promises could turn out to be as nebulous as their offerings.
Open Hardware 1.0
The Open Source Hardware Definition brings the ideals of open source to hardware design. The movement marked a milestone with its first major release.
Eat. Pray. Script.
Lazy … er, smart … administrators are hard at work in the background via scripts, cascading scripts, and cron jobs.
Understanding Privilege Escalation
This sample attack will show you some of the techniques intruders use to scale up their powers.
Intruder Tools
Professional attackers have much more pointed at your site than just Nmap, and you should too if you want to test your network’s security. We’ll show you some tools intruders use to gather information.
Web and Mail Servers with IPv6
If you run a web server and a mail server and anticipate that users from Asia will access your system, it’s time to get it ready for IPv6.
Intruder Detection with tcpdump
Tcpdump is a general-purpose packet sniffer and incident response tool that should be in your tool shed.
Using a Tablet as a Portable Management Console
Using a Tablet as a portable management console makes sense but could make you too accessible.
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Most Popular
Support Our Work
ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.