Articles

Lead Image © Davorr, Fotolia.com

Lead Image © Davorr, Fotolia.com

Workspace ONE for endpoint management

VMware Workspace ONE provides a secure and user-friendly digital workplace. We look at the features, components, and architecture of Workspace ONE, as well as application management and simplification of the integration of end devices through user self-enrollment.
Photo by Beau Runsten on Unsplash

Photo by Beau Runsten on Unsplash

Clustering with the Nutanix Community Edition

The free Community Edition of the Nutanix hyperconverged infrastructure, Nutanix on-premises cloud, is offered alongside its commercial product for those looking to take their first steps in the environment.
Lead Image © Lucy Baldwin, 123RF.com

Lead Image © Lucy Baldwin, 123RF.com

Data Compression as a CPU Benchmark

Data compression is a more realistic compute benchmark than number crunching.
Lead Image © Jeff Metzger, 123RF.com

Lead Image © Jeff Metzger, 123RF.com

Hardware-enhanced security

Nitrokey hardware authentication devices aim to raise data encryption, key management, and user authentication security to the next level.
Photo by NoWah Bartscher on Unsplash

Photo by NoWah Bartscher on Unsplash

Gatling load-testing tool

Generate load on servers and services with the Gatling load-testing tool.
Photo by Simon Moog on Unsplash

Photo by Simon Moog on Unsplash

Secure email communication

DMARC combines the abilities of SPF and DKIM to safeguard and protect against spam and phishing and allows targeted configuration according to company policy.
Photo by Artem Bryzgalov on Unsplash

Photo by Artem Bryzgalov on Unsplash

Attack and defense techniques

The MITRE ATT&CK and D3FEND knowledge databases provide useful techniques for securing your IT infrastructure.
Photo by Mohamed Shaffaf on Unsplash

Photo by Mohamed Shaffaf on Unsplash

New features in Windows Terminal Preview

Windows Terminal Preview comes with interesting new features, such as state-preserving quick windows access via shortcuts and configuration of almost all settings in a GUI, which is reason enough to take a look at the preview.
Lead Image © Sgursozlu, Fotolia.com

Lead Image © Sgursozlu, Fotolia.com

macOS file recovery and security

macOS on-board tools and third-party applications can help prevent the loss of files and make security and backup your first priority.
Photo by Soner Eker on Unsplash

Photo by Soner Eker on Unsplash

Detecting and analyzing man-in-the-middle attacks

Wireshark and a combination of tools comprehensively analyze your security architecture.
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs



Support Our Work

ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.

Learn More”>
	</a>

<hr>		    
			</div>
		    		</div>

		<div class=