Articles

Lead Image © scanrail, 123RF.com

Lead Image © scanrail, 123RF.com

Cryptographic key access in the cloud

Cryptographic keys, usually available locally but not on remote computers, can be accessed for use in cloud environments.
Lead Image © 36clicks, 123RF.com

Lead Image © 36clicks, 123RF.com

Validating Docker containers

A new test tool by Google lets you peek inside Docker containers, so you can make sure they hold exactly what you expect.
Lead Image © Martina Berg, Fotolia.com

Lead Image © Martina Berg, Fotolia.com

Open source customer relationship management software

SuiteCRM 7 is a powerful open source enterprise customer relationship management solution.
Photo by Stephen Pedersen on Unsplash

Photo by Stephen Pedersen on Unsplash

Isolate workloads from Docker and Kubernetes with Kata Containers

Kata Containers adds an additional layer of isolation, and Docker users don't even need to learn new commands.
Lead Image © Andrea Danti, 123RF.com

Lead Image © Andrea Danti, 123RF.com

Data Security vs. Data Protection

Data protection and data security are similar-sounding aspects of information security: one legal and one technical.
Lead Image © krisckam, 123RF.com

Lead Image © krisckam, 123RF.com

The AWS CDK for software-defined deployments

Cloudy with a chance of better provisioning tools: The new Amazon Web Services Cloud Development Kit adds a powerful new tool to the DevOps toolkit.
Lead Image by Adarsh Kummur on Unsplash

Lead Image by Adarsh Kummur on Unsplash

New features in MariaDB 10.3

What lacked maturity in MariaDB 10.2 has now been sorted out in version 10.3. We look at the benefits you can reap now.
Photo by Geran de Klerk on Unsplash

Photo by Geran de Klerk on Unsplash

Cyber security for the weakest link

The balance between IT threats and IT security is woefully unbalanced in a Windows environment, requiring the enforcement of company-wide security standards.
Lead Image © Bruce Rolff, 123RF.com

Lead Image © Bruce Rolff, 123RF.com

Forensic main memory analysis with Volatility

When you examine the memory of a computer after a break-in, take advantage of active support from the Volatility framework to analyze important memory structures and read the volatile traces of an attack.
Photo by Rock'n Roll Monkey on Unsplash

Photo by Rock'n Roll Monkey on Unsplash

The new version of Chef Automate comes with many new features

Chef, one of the oldest automation solutions, seeks to become a universal administration robot for cloud environments with new version 2.0.
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs



Support Our Work

ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.

Learn More”>
	</a>

<hr>		    
			</div>
		    		</div>

		<div class=