Articles

Photo by Kelly Sikkema on Unsplash

Photo by Kelly Sikkema on Unsplash

Manage Windows AD with PowerShell

PowerShell helpers let you automate searches in Active Directory and secure critical accounts.
Photo by Harry Cunningham on Unsplash

Photo by Harry Cunningham on Unsplash

IT automation with SaltStack

SaltStack is a fast and reliable modular toolbox written in Python that contains ready-made modules for many configuration management purposes.
Lead Image © alphaspirit, 123RF.com

Lead Image © alphaspirit, 123RF.com

HTTP/1.1 versus HTTP/2 and HTTP/3

HTTP/2 introduced multiplexing, resulting in superior bandwidth utilization over HTTP/1.1, and HTTP/3 solves the problem of transmission delays from packet loss by replacing TCP with QUIC.
Photo by Oudom Pravat on Unsplashx

Photo by Oudom Pravat on Unsplashx

Managing network connections in container environments

Traefik promises not only to manage mesh implementations for container environments reliably, but to do so in a way that makes them enjoyable to administer.
Lead Image © Guido Vrola, 123RF.com

Lead Image © Guido Vrola, 123RF.com

Professional protection for small and mid-size enterprises

To what extent does the Untangle NG Firewall, where apps come together like pieces of a jigsaw, meet customer criteria for protection, usability, price, and support?
Lead Image © zelfit, 123rf.com

Lead Image © zelfit, 123rf.com

Shadow admin permissions and your AWS account

Malicious attackers are trying to conquer your AWS castle in the cloud. To mount a strong defense, you'll need a deeper understanding of privilege escalation and shadow admin permissions.
Lead Image © Lucy Baldwin, 123RF.com

Lead Image © Lucy Baldwin, 123RF.com

Finding Your Way Around a GPU-Accelerated Cloud Environment

We look at the tools needed to discover, configure, and monitor an accelerated cloud instance, employing the simplest possible tool to get the job done.
Photo Johannes Plenio on Unsplash

Photo Johannes Plenio on Unsplash

Storage protocols for block, file, and object storage

The future of flexible, performant, and highly available storage.
Photo by Craig Whitehead on Unsplash

Photo by Craig Whitehead on Unsplash

Protect Hyper-V with on-board resources

With the right settings and small tools, security in virtual environments can be increased significantly by tweaking the on-board tools.
Photo by Steve Harvey on Unsplash

Photo by Steve Harvey on Unsplash

Pattern matching dispute in Python 3.10

A controversial change is taking place in Python version 3.10 known mainly from functional languages: pattern matching.
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs



Support Our Work

ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.

Learn More”>
	</a>

<hr>		    
			</div>
		    		</div>

		<div class=