Articles

Lead Image © Peapop, Fotolia.com

Lead Image © Peapop, Fotolia.com

Migrate your workloads to the cloud

Move a workload to the cloud without trouble, and leverage cloud benefits for a conventional setup.
Lead Image © efks, 123RF.com

Lead Image © efks, 123RF.com

Cloud-native storage for Kubernetes with Rook

Kubernetes is known to be inflexible when it comes to persistent storage, but Rook now offers cloud-native storage and seeks to achieve harmony.
Lead Image Photo by Simeon Jacobson on Unsplash

Lead Image Photo by Simeon Jacobson on Unsplash

Improved defense through pen testing

Discover indicators of compromise with open source pen testing tools.
Lead Image © Steven Cukrov, 123rf.com

Lead Image © Steven Cukrov, 123rf.com

Link aggregation with kernel bonding and the Team daemon

The Linux world has different implementations for integrating multiple network cards: kernel old-timer ifenslave and the younger libteam.
Photo by Damon Lam on Unsplash

Photo by Damon Lam on Unsplash

Open source multipoint VPN with VyOS

The VyOS Linux distribution puts network routing, firewall, and VPN functionality together and presents a fully working dynamic multipoint VPN router as an alternative or addition to a Cisco DMVPN mesh.
Lead Image © mikdam, 123RF.com

Lead Image © mikdam, 123RF.com

Preparing to move to the cloud

Because the cloud is ubiquitous, some companies think that outsourcing their business applications to Amazon, Google, and the like is a breeze. In fact, on the way, treacherous winds blow just off the beaten track.
Lead Image © Mykola Velychko, Fotolia.com

Lead Image © Mykola Velychko, Fotolia.com

Focusing on security in Active Directory

To prevent an intruder attack in Active Directory, Windows Server's security features along with freeware monitoring can save the day.
Photo by Quino Al on Unsplash

Photo by Quino Al on Unsplash

Analyzing tricky database problems

Database administrators at the Swiss foundation Switch were increasingly encountering corrupt data, which prompted a painstaking bug hunt. The solution they found increased performance by a factor of six.
Lead Image © abidal, 123rf.com

Lead Image © abidal, 123rf.com

Integrating scripts into Group Policy

Incorporating scripts into Group Policy can make a sys admin's job much easier.
Lead Image © Dmytro Demianenko, 123RF.com

Lead Image © Dmytro Demianenko, 123RF.com

Dialing up security for Docker containers

Docker containers are a convenient way to run almost any service, but admins need to be aware of the need to address some important security issues.
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs



Support Our Work

ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.

Learn More”>
	</a>

<hr>		    
			</div>
		    		</div>

		<div class=