Articles

Photo by Glen Carrie on Unsplash

Photo by Glen Carrie on Unsplash

eSIMs in the enterprise

In this overview, we look at the opportunities eSIM technology offers for the mobile workplace and what IT managers need to watch out for in deployment and management.
Photo by Soner Eker on Unsplash

Photo by Soner Eker on Unsplash

Detecting and analyzing man-in-the-middle attacks

Wireshark and a combination of tools comprehensively analyze your security architecture.
Photo by Pablo Heimplatz on Unsplash

Photo by Pablo Heimplatz on Unsplash

Server update with Azure Update Management

Microsoft Azure Update Management automatically patches servers in on-premises data centers, virtual servers on Azure and other cloud services, and even Linux servers.
Photo by CHUTTERSNAP on Unsplash

Photo by CHUTTERSNAP on Unsplash

JMeter tests loads and measures performance of static and dynamic resources

The JMeter specialized integrated development environment applies test scripts for load testing and performance evaluation and supports various protocols that come in handy for Internet-powered applications.
Lead Image © Olivier Le Moal, 123RF.com

Lead Image © Olivier Le Moal, 123RF.com

Secure SSH connections the right way

Admins use SSH, the proverbial Swiss army knife of system management, for many of their daily tasks, but no matter how powerful the tool might be, it typically does not offer adequate protection. We look at ways to tighten SSH security.
Photo by Clay LeConey on Unsplash

Photo by Clay LeConey on Unsplash

Getting started with Prometheus

Prometheus is a centralized time series database with metrics, scraping, and alerting logic built in. We help you get started monitoring with Prometheus.
Photo by Muneeb Syed on Unsplash

Photo by Muneeb Syed on Unsplash

Use Linux Containers with WSL2 on Windows

Deploy a full Linux container environment, including a Kubernetes cluster, on Windows with Windows Subsystem for Linux version 2.
Lead Image © bluebay, 123rf.com

Lead Image © bluebay, 123rf.com

Hunt down vulnerabilities with the Metasploit pen-testing tool

The veteran Metasploit is by no means obsolete and is still used as a typical workflow to find and analyze security vulnerabilities in Windows 10 and Linux systems.
Photo by Andrea Davis on Unsplash

Photo by Andrea Davis on Unsplash

Nested Kubernetes with Loft

Kubernetes has limited support for multitenancy, so many admins prefer to build multiple standalone Kubernetes clusters that eat up resources and complicate management. As a solution, Loft launches any number of clusters within the same control plane.
Lead Image © Victor Zastolskiy, 123RF.com

Lead Image © Victor Zastolskiy, 123RF.com

Run applications in a containerized sandbox with Firejail

Isolate popular applications in flexible, easy-to-set-up, and easy-to-take-down containers with Firejail.
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs



Support Our Work

ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.

Learn More”>
	</a>

<hr>		    
			</div>
		    		</div>

		<div class=