Articles

Lead Image © sermax55, 123RF.com

Lead Image © sermax55, 123RF.com

New Exchange standard

Service Pack 1 for Exchange 2013 introduced a new protocol, which has become the default in Exchange 2016: MAPI over HTTP.
Lead Image © cepixx, 123RF.com

Lead Image © cepixx, 123RF.com

Safeguard and scale containers

Security, deployment, and updates for thousands of nodes prove challenging in practice, but with CoreOS and Kubernetes, you can orchestrate container-based web applications in large landscapes.
Lead Image © scyther5, 123RF.com

Lead Image © scyther5, 123RF.com

Hyper-V containers with Windows Server 2016

The release of Windows Server 2016 also heralds a new version of Hyper-V, with improved cloud security, flexible virtual hardware, rolling upgrades of Hyper-V clusters, and production checkpoints.
Lead Image © french 03, photocase.com

Lead Image © french 03, photocase.com

A script for strict packet filter updates

Automatically create restrictive rules in Linux iptables packet filters.
Lead Image © Amy Walters, 123RF.com

Lead Image © Amy Walters, 123RF.com

Writing SELinux modules

Much has happened in the field of SELinux in the last few years, including the development of new usability features. The current release makes it easier to write SELinux policy modules yourself.
Lead Image © Brian Kenney, 123RF.com

Lead Image © Brian Kenney, 123RF.com

Exploring OpenStack's Trove DBaaS

DBaaS moves the database service to the cloud, promising a new database instance at the click of a mouse.
Lead Image © Tom Wang, 123RF.com

Lead Image © Tom Wang, 123RF.com

Proactive Monitoring

System administrators usually take action after monitoring software indicates the failure of a service or server. In contrast to this reactive approach, a proactive monitoring solution with Riemann allows admins to detect problems in advance.
Lead Image © Daniela Mangiuca, 123RF.com

Lead Image © Daniela Mangiuca, 123RF.com

Countering embedded malware attacks

With the resurgence of sophisticated macro virus attacks, new countermeasures are in order. We offer a few recommendations.
Lead Image © vlue, 123RF.com

Lead Image © vlue, 123RF.com

Windows security with public key infrastructures

A rarely used feature for improving security in Windows environments relies on certificates issued for various applications, services, and procedures that is based on a public key infrastructure.
Lead Image © Marc Dietrich, 123RF.com

Lead Image © Marc Dietrich, 123RF.com

New features in jQuery 3

The functions and objects of the jQuery JavaScript library make the work of web developers much easier. Although jQuery 3 remains largely compatible with version 2, some changes might prevent its use.
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs



Support Our Work

ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.

Learn More”>
	</a>

<hr>		    
			</div>
		    		</div>

		<div class=