Articles

Photo by Alexander Grey on Unsplash

Photo by Alexander Grey on Unsplash

Encrypting DNS traffic on Linux with DoT

Prevent attackers from spying on DNS communication or manipulating responses by encrypting your DNS traffic on Linux with the DNS-over-TLS standard and the help of systemd-resolved.
Lead Image © alphaspirit, 123RF.com

Lead Image © alphaspirit, 123RF.com

Making Kerberoasting uneconomical

A method known as Kerberoasting is an exploitation technique of the Kerberos authentication protocol. We take a closer look at the available safeguards and detection measures against this attack.
Lead Image © zeferli, 123RF.com

Lead Image © zeferli, 123RF.com

Securing the container environment

Implement a good, robust defense with an in-depth strategy of applying multiple layers of security to all components, including the human factor.
Lead Image © Levente Janos, 123RF.com

Lead Image © Levente Janos, 123RF.com

Admin as a service with sysstat for ex-post monitoring

The top, vmstat, and iotop monitoring tools for Linux show the current situation but do not provide any information about the past – which is where sysstat comes into play.
Lead Image © Tjefferson, Fotolia.com

Lead Image © Tjefferson, Fotolia.com

Security and automation with SBOMs

Already mandatory in the United States and recently approved in Europe thanks to new legislation, a software bill of materials provides information about software components, enabling IT managers to respond better to attacks and vulnerabilities.
Photo by Stoochi Lam on Unsplash

Photo by Stoochi Lam on Unsplash

Centralized monitoring and intrusion detection

Security Onion bundles numerous individual Linux tools that help you monitor networks or fend off attacks to create a standardized platform for securing IT environments.
Lead Image © Aleksey Mnogosmyslov, 123RF.com

Lead Image © Aleksey Mnogosmyslov, 123RF.com

DevSecOps with DefectDojo

The DefectDojo vulnerability management tool helps development teams and admins identify, track, and fix vulnerabilities early in the software development process.
Lead Image © limbi007, 123RF.com

Lead Image © limbi007, 123RF.com

Secure Kubernetes with Kubescape

Kubescape checks Kubernetes container setups for security and compliance issues, making life easier for administrators.
Photo by John Cameron on Unsplash

Photo by John Cameron on Unsplash

Fight Windows ransomware with on-board tools

Ransomware defense involves two strategies: identifying attacks and slowing the attackers to mitigate their effects.
Lead Image © grafner, 123RF.com

Lead Image © grafner, 123RF.com

Simple, small-scale Kubernetes distributions for the edge

We look at three scaled-down, compact Kubernetes distributions for operation on edge devices or in small branch office environments.
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs



Support Our Work

ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.

Learn More”>
	</a>

<hr>		    
			</div>
		    		</div>

		<div class=