Articles

Lead Image © destinacigdem, 123RF.com

Lead Image © destinacigdem, 123RF.com

The end of SHA-1

The SHA-1 cryptographic hash function has been considered insecure for a long time. Some Linux distributions have banned or no longer use it – with some consequences, though.
Lead Image © Maksim Kabakou, 123RF.com

Lead Image © Maksim Kabakou, 123RF.com

Data security and data governance

Protecting data becomes increasingly important as the quantity and value of information grows. We describe the basics of data security and governance and how they intertwine.
Photo by Susann Schuster on Unsplash

Photo by Susann Schuster on Unsplash

Network monitoring with Zeek

Zeek offers an arsenal of scripts for monitoring popular network protocols and comes with its own policy scripting language for customization.
Lead Image © Igor Kovalchuk, 123RF.com

Lead Image © Igor Kovalchuk, 123RF.com

Analysis tour with Binary Ninja

Binary analysis is an advanced technique used to work through cyberattacks and malware infestations and is also known as reverse engineering. We show you how to statically analyze binary programs with Binary Ninja, an interactive binary analysis platform.
Photo by Robert Anasch on Unsplash

Photo by Robert Anasch on Unsplash

IAM for midmarket companies

We look at the role of identity and access management in midmarket organizations.
Photo by Kelly Sikkema on Unsplash

Photo by Kelly Sikkema on Unsplash

When are Kubernetes and containers not a sensible solution?

As the major Linux distributors increasingly lean toward containers, many administrators have come to realize that containers are by no means a panacea for all their problems.
Photo by Marc Sendra Martorell on Unsplash

Photo by Marc Sendra Martorell on Unsplash

SoftEther VPN software

SoftEther is lean VPN software that outpaces the current king of the hill, OpenVPN, in terms of technology and performance.
Lead Image © elnur, 123RF.com

Lead Image © elnur, 123RF.com

Alternative virtualization solutions when OpenStack is too much

OpenStack is considered the industry standard for building private clouds, but the solution is still far too complex and too difficult to maintain and operate for many applications. What causes OpenStack projects to fail, and what alternatives do administrators have?
Photo by Aarón Blanco Tejedor on Unsplash

Photo by Aarón Blanco Tejedor on Unsplash

Load test your website with Siege

A stress and benchmarking tool for websites controlled from the command line.

Versioned backups of local drives with Git

Versioning is a recommended approach to back up files as protection against hardware failures and user errors. To create versioned backups, you can use established backup programs or an open source tool that originates from the developer world: Git.
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs



Support Our Work

ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.

Learn More”>
	</a>

<hr>		    
			</div>
		    		</div>

		<div class=