Articles

Photo by the blowup on Unsplash

Photo by the blowup on Unsplash

Save sudo logs on a remote computer

One of the new features implemented in the current 1.9 version of the sudo tool is the ability to save sudo logs locally and on a remote computer.

Controlled container communication

Tune the iptables configuration for Docker by establishing your own forwarding rules.
Photo by Michael Geiger on Unsplash

Photo by Michael Geiger on Unsplash

Ransomware: Prepare for emergencies

The danger of ransomware attacks calls for a robust backup and monitoring strategy.

Secure passwordless logins with FIDO2 and LDAP

Log in to your account securely without a password with LDAP and a schema to establish the objects and attributes required for FIDO2 authentication.
Photo by Nick Fewings on Unsplash

Photo by Nick Fewings on Unsplash

Integrating Podman and systemd

With the integration of Podman and systemd, you can put any software inside a container under the control of systemd and see almost no difference between running the service directly on the host or inside a container.
Photo by Dane Deaner on Unsplash

Photo by Dane Deaner on Unsplash

Reducing the Windows 10 attack surface

Windows attack surface reduction policies make significant progress in protecting your entire IT infrastructure.
Photo by Wynand van Poortvliet on unsplash

Photo by Wynand van Poortvliet on unsplash

Grafana and Prometheus customized dashboards

Grafana analytics and visualization dashboards plus the Prometheus monitoring and alerting tool make possible extensive custom reporting and alerting systems.

Photo by Jan Schulz # Webdesigner Stuttgart

Cloud-native storage with OpenEBS

Software from the open source OpenEBS project provides a cloud-native storage environment that makes block devices available to individual nodes in the Kubernetes cluster.
Photo by Patrick Schneider on Unsplash

Photo by Patrick Schneider on Unsplash

Kafka: Scaling producers and consumers

A guide to 10x scaling in Kafka with real-world metrics for high throughput, low latency, and cross-geographic data movement.
Lead Image © ginasanders, 123RF.com

Lead Image © ginasanders, 123RF.com

Protect privileged accounts in AD

Granular protection for highly privileged accounts is granted by the Protected Users group in Active Directory and Kerberos authentication policies.
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs



Support Our Work

ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.

Learn More”>
	</a>

<hr>		    
			</div>
		    		</div>

		<div class=