Articles from ADMIN Issue 63
To what extent does the Untangle NG Firewall, where apps come together like pieces of a jigsaw, meet customer criteria for protection, usability, price, and support?
With the right settings and small tools, security in virtual environments can be increased significantly by tweaking the on-board tools.
Traefik promises not only to manage mesh implementations for container environments reliably, but to do so in a way that makes them enjoyable to administer.
Malicious attackers are trying to conquer your AWS castle in the cloud. To mount a strong defense, you'll need a deeper understanding of privilege escalation and shadow admin permissions.
Security safeguards protect data on MySQL servers.
The danger of ransomware attacks calls for a robust backup and monitoring strategy.
If you like ASCII-based monitoring tools, take a look at three new tools – Zenith, Bpytop, and Bottom.
One of the new features implemented in the current 1.9 version of the sudo tool is the ability to save sudo logs locally and on a remote computer.
The future of flexible, performant, and highly available storage.
A controversial change is taking place in Python version 3.10 known mainly from functional languages: pattern matching.