Articles
Best practices for secure script programming
The lax syntax verification of shell scripts and a lack of attention to detail in programming can create impressively dangerous security vulnerabilities.
Tinkerbell life-cycle management
Tinkerbell specializes in bare metal deployment and life-cycle management, allowing intervention in every phase of the setup.
Fast and scalable ownCloud Infinite Scale
A complete rebuild of ownCloud delivers the speedy and scalable ownCloud Infinite Scale file platform.
Back up virtual machines and clusters
Vembu BDR Suite provides comprehensive software that supports flexible configuration when backing up virtual production operations.
Kubernetes clusters within AWS EKS
Automated deployment of the AWS-managed Kubernetes service EKS helps you run a production Kubernetes cluster in the cloud with ease.
Self-signed certificates with Jenkins
Convince Jenkins as a Docker container to recognize self-signed certificates, verify that the instance is connecting to the correct online service, and that your traffic is transmitted in an encrypted format.
Unleashing Accelerated Speeds with RAM Drives
Enable and share performant block devices across a network of compute nodes with the RapidDisk kernel RAM drive module.
Forensic analysis with Autopsy and Sleuth Kit
Forensic admins can use the Autopsy digital forensics platform to perform an initial analysis of a failed system, looking for traces of a potential attack.
Run Kubernetes in a container with Kind
Create a full-blown Kubernetes cluster in a Docker container with just one command.
Manage Windows AD with PowerShell
PowerShell helpers let you automate searches in Active Directory and secure critical accounts.
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Most Popular
Support Our Work
ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.