Articles

Lead Image © Victor Zastolskiy, 123RF.com

Lead Image © Victor Zastolskiy, 123RF.com

Run applications in a containerized sandbox with Firejail

Isolate popular applications in flexible, easy-to-set-up, and easy-to-take-down containers with Firejail.
Lead Image © Cornelius, Fotolia.com

Lead Image © Cornelius, Fotolia.com

Linux apps on Windows 10 and Chrome OS

Microsoft and Google have upgraded their in-house operating systems, Windows 10 and Chrome OS, with subsystems to run Linux. We look into their highly different approaches.
Lead Image © bowie15 , 123RF.com

Lead Image © bowie15 , 123RF.com

Docker and Podman environments on Windows and Mac machines

Develop container applications on a Windows or Mac system with Docker Desktop or Podman.
Photo by Filip Mroz on Unsplash

Photo by Filip Mroz on Unsplash

Bpytop command-line monitoring tool

The bpytop command-line monitoring tool provides a variety of information via a fancy user interface and supports network monitoring and mouse- or keyboard-based control.
Lead Image © Amy Walters, 123RF.com

Lead Image © Amy Walters, 123RF.com

Hardening network services with DNS

The Domain Name System, in addition to assigning IP addresses, lets you protect the network communication of servers in a domain. DNS offers further hardening of network protocols – in particular, SSH fingerprinting and CAA records.
Photo by Pawel Nolbert on Unsplash

Photo by Pawel Nolbert on Unsplash

Multicloud management with Ansible

Remain independent of your cloud provider by automatically rolling out virtual machines and applications with Ansible neutral inventory files.
Lead Image © Alexander Tkach, 123RF.com

Lead Image © Alexander Tkach, 123RF.com

QUMBU backup and maintenance tool for Microsoft SQL Server

QUMBU lets database administrators – even those with less experience – perform straightforward SQL Server backups and maintenance checks.

Zero-Ops Kubernetes with MicroK8s

A zero-ops installation of Kubernetes with MicroK8s operates on almost no compute capacity and roughly 700MB of RAM.
Photo by Mac Gaither on Unsplash

Photo by Mac Gaither on Unsplash

OPA and Gatekeeper enforce policy defaults in Kubernetes

Enforce container compliance in Kubernetes in one of two ways: with Open Policy Agent or Gatekeeper.
Lead Image © Vlad Kochelaevskiy, Fotolia.com

Lead Image © Vlad Kochelaevskiy, Fotolia.com

Ergonomics and security of graphical email clients

We look at the ease of finding a way around current graphical email clients by investigating ergonomics, security, and extensibility.
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs



Support Our Work

ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.

Learn More”>
	</a>

<hr>		    
			</div>
		    		</div>

		<div class=