Articles

Photo by Marc Sendra Martorell on Unsplash

Photo by Marc Sendra Martorell on Unsplash

SoftEther VPN software

SoftEther is lean VPN software that outpaces the current king of the hill, OpenVPN, in terms of technology and performance.
Lead Image © elnur, 123RF.com

Lead Image © elnur, 123RF.com

Alternative virtualization solutions when OpenStack is too much

OpenStack is considered the industry standard for building private clouds, but the solution is still far too complex and too difficult to maintain and operate for many applications. What causes OpenStack projects to fail, and what alternatives do administrators have?
Photo by Aarón Blanco Tejedor on Unsplash

Photo by Aarón Blanco Tejedor on Unsplash

Load test your website with Siege

A stress and benchmarking tool for websites controlled from the command line.

Versioned backups of local drives with Git

Versioning is a recommended approach to back up files as protection against hardware failures and user errors. To create versioned backups, you can use established backup programs or an open source tool that originates from the developer world: Git.

Encrypt and decrypt files with Age or Rage

Age and Rage are the Go and Rust implementations of a simple, modern, and secure file encryption tool.
Photo by Jonathan Chng on Unsplash

Photo by Jonathan Chng on Unsplash

Quick UDP Internet connections

The UDP-based Quick UDP Internet Connections (QUIC) protocol comes with mandatory TLS encryption and promises faster speeds.
Lead Image © bloomua, 123RF.com

Lead Image © bloomua, 123RF.com

Policy rulesets in cloud-native environments

What a user is allowed to do in a program is usually defined by a role model, which often poses numerous challenges, especially in the cloud or for infrastructure as code. The free Open Policy Agent offers a flexible way to manage user rights.
Lead Image © JPaget RFphotos, 123RF.com

Lead Image © JPaget RFphotos, 123RF.com

Diving into infrastructure security

How to deal with threat intelligence on the corporate network when the existing security tools are not effective.
Photo by Eric Froehling on Unsplash

Photo by Eric Froehling on Unsplash

Goodbye virtual machines, hello microVMs

You can have your cake and eat it, too: MicroVMs feature the strong isolation of virtual machines and lightweight behaviors of containers.
Photo by saeed karimi on Unsplash

Photo by saeed karimi on Unsplash

DNS name resolution with HTTPS

Now that web content is encrypted by HTTPS, the underlying name resolution is often unprotected. We look at the classic DNS protocol and investigate whether DNS over HTTPS could be the solution to ensure the confidentiality of DNS requests.
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs



Support Our Work

ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.

Learn More”>
	</a>

<hr>		    
			</div>
		    		</div>

		<div class=