Articles
Forensic main memory analysis with Volatility
When you examine the memory of a computer after a break-in, take advantage of active support from the Volatility framework to analyze important memory structures and read the volatile traces of an attack.
Cyber security for the weakest link
The balance between IT threats and IT security is woefully unbalanced in a Windows environment, requiring the enforcement of company-wide security standards.
The new version of Chef Automate comes with many new features
Chef, one of the oldest automation solutions, seeks to become a universal administration robot for cloud environments with new version 2.0.
Cloud-native storage for Kubernetes with Rook
Kubernetes is known to be inflexible when it comes to persistent storage, but Rook now offers cloud-native storage and seeks to achieve harmony.
Migrate your workloads to the cloud
Move a workload to the cloud without trouble, and leverage cloud benefits for a conventional setup.
Link aggregation with kernel bonding and the Team daemon
The Linux world has different implementations for integrating multiple network cards: kernel old-timer ifenslave and the younger libteam.
Improved defense through pen testing
Discover indicators of compromise with open source pen testing tools.
Open source multipoint VPN with VyOS
The VyOS Linux distribution puts network routing, firewall, and VPN functionality together and presents a fully working dynamic multipoint VPN router as an alternative or addition to a Cisco DMVPN mesh.
Monitoring and service discovery with Consul
When dozens of new services and VMs emerge and disappear every day in dynamic cloud environments, conventional monitoring provides false alarms, not operational security.
AWS security scans with Scout2
Scout2 is an open source auditing tool that helps you keep your AWS environments secure.
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Most Popular
Support Our Work
ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.