Articles

Lead Image © Alexandr Marinenko, 123RF.com

Lead Image © Alexandr Marinenko, 123RF.com

Server administration using Cockpit

Cockpit makes it easy to manage Linux servers: Four mouse clicks in the browser restart the crashed web server, and four more interconnect the server's network interfaces. Pilots flying in this cockpit, though, have to cope with a few limitations.
Lead Image © Wavebreak Media Ltd, 123RF.com

Lead Image © Wavebreak Media Ltd, 123RF.com

Automation with Ansible

Ansible offers automatic provisioning and configuration capabilities similar to that of Chef and Puppet, but it's aimed more at admins than developers.
Lead Image © Spectral, Fotolia.com

Lead Image © Spectral, Fotolia.com

Creating a redundant array of inexpensive links

The Fault Tolerant Router daemon uses multipath routing among multiple Internet connections to keep you connected, even when some connections go down.
Lead Image © foottoo, 123RF.com

Lead Image © foottoo, 123RF.com

IPv6 security on IPv4-only networks

Even though corporations are looking to move to IPv6, in some situations networks still rely exclusively on IPv4. We discuss ways to minimize delays and unsatisfactory behavior in mixed IPv4/IPv6 IT environments.
Lead Image © Author, 123RF.com

Lead Image © Author, 123RF.com

OpenStack Kilo release

The OpenStack project has released the latest version of its software, code-named Kilo. We take a closer look.
Lead Image © alphaspirit, 123RF.com

Lead Image © alphaspirit, 123RF.com

Moving Data Between Virtual Machines

Network information in virtualized computer landscapes is not easy to access. In this article, we look at a few approaches you can use.
Lead Image © Ignard ten Have, 123RF.com

Lead Image © Ignard ten Have, 123RF.com

Ticket Management with osTicket

osTicket is a lean ticket system that limits itself to the core functions of receiving and processing requests.
Lead Image © Author, 123RF.com

Lead Image © Author, 123RF.com

Tested – Tenable Nessus v6

To ensure your servers and workstations are well protected against attacks on your network, you need a professional security scanner. In version 6, Tenable has substantially expanded its Nessus vulnerability scanner. We pointed the software at a number of test computers.
Lead Image © Andrey KOTKO, 123RF.com

Lead Image © Andrey KOTKO, 123RF.com

Comparing Logon Script Alternatives

We compare the performance of batch, VBScript, and PowerShell commands with four standard tasks.
Lead Image © Kurhan, 123RF.com

Lead Image © Kurhan, 123RF.com

Detecting intruders with Suricata

If you're looking for an intrusion detection and prevention system, it pays to shop around. Suricata offers scalable performance and an impressive set of features – it even supports Snort rulesets.
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs



Support Our Work

ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.

Learn More”>
	</a>

<hr>		    
			</div>
		    		</div>

		<div class=