Articles

Lead Image © insima, 123RF.com

Lead Image © insima, 123RF.com

Security in the network with Kali Linux

Thanks to its huge choice of security tools, Linux is perfectly suited to securing heterogeneous networks. With a specialized distro like Kali Linux, you can quickly locate and eliminate security vulnerabilities.
Lead Image © SV-Luma, 123RF.com

Lead Image © SV-Luma, 123RF.com

Optimizing utilization with the EDF scheduler

The superior "Earliest Deadline First" task scheduling method has been part of Linux since kernel 3.14.
Lead Image © Maksim Kabou, 123RF.com

Lead Image © Maksim Kabou, 123RF.com

From debugging to exploiting

Kernel and compiler security techniques, together with sound programming practices, fend off memory corruption exploits.
Lead Image © mopic, 123RF.com

Lead Image © mopic, 123RF.com

Data Analysis with R and Python

The statistical programming language R dissects its database in a masterful way, and you can embed your R in Python using the Rpy2 interface.
Lead Image © Orlando Rosu, 123RF.com

Lead Image © Orlando Rosu, 123RF.com

DIME and Dark Mail seek to change the world of digital mail

Email has the reputation of being insecure, unreliable, and easily readable for any user – just like a postcard. An initiative led by the founders of Lavabit and PGP hopes to replace email with a new medium.
Lead Image © nerhuz, 123RF.com

Lead Image © nerhuz, 123RF.com

Transport Encryption with DANE and DNSSEC

Those who think that enabling STARTTLS in the mail client will make their mail traffic more secure are wrong. Only those who bank on DANE can be sure that a mail server or a firewall will not switch off encryption in transit.
Lead Image © Franck, 123RF.com

Lead Image © Franck, 123RF.com

Setting up FreeNAS

FreeNAS offers a range of features to suit your storage needs. We show you how to get started.
Lead Image © MuharremZengin, 123RF.com

Lead Image © MuharremZengin, 123RF.com

Lean on Logwatch

Logging is of such importance in security monitoring and troubleshooting that easy access to the information buried in logfiles is essential. The Logwatch tool monitors logs and analyzes and reports on activities of interest as specified in configuration files.
Lead Image © PozitivStudija, fotolia.com

Lead Image © PozitivStudija, fotolia.com

Zentyal Server 3.5

Some users may struggle when setting up various services, such as web servers, email servers, firewalls, and the like. Zentyal simplifies configuration of all those things, thanks to its intuitive user interface.
Lead Image © Le Moal Olivier, 123RF.com

Lead Image © Le Moal Olivier, 123RF.com

Creating SmartOS zones using UCARP

We show how to create highly available SmartOS zones using UCARP.
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs



Support Our Work

ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.

Learn More”>
	</a>

<hr>		    
			</div>
		    		</div>

		<div class=