Articles

Lead Image © Sebastian Duda, 123RF.com

Lead Image © Sebastian Duda, 123RF.com

Build and host Docker images

When facing the challenge of packaging your application in a container, take into account your needs in terms of handling and security and investigate sensible options for hosting your own registry.
Lead Image © Konstantin Inozemtcev, 123RF.com

Lead Image © Konstantin Inozemtcev, 123RF.com

Fast email server deployments with iRedMail

Setting up and maintaining an email service in the data center doesn't have to be a nightmare. The iRedMail open source solution lets you deploy a full-featured email server on a number of platforms in a matter of minutes.
Lead Image © Rachael Arnott, 123RF.com

Lead Image © Rachael Arnott, 123RF.com

Border Gateway Protocol

We look at the Border Gateway Protocol, how it routes packets through the Internet, its weaknesses, and some hardening strategies.

Building a defense against DDoS attacks

Targeted attacks such as distributed denial of service, with thousands of computers attacking your servers until one of them caves in, cannot be prevented, but they can be effectively mitigated.
Photo by Kelly Sikkema on Unsplash

Photo by Kelly Sikkema on Unsplash

Recovering from a cyberattack in a hybrid environment

Restoring identity is an important part of disaster recovery, since it lays the foundation for restoring normality and regular operations. We look into contingency measures for hybrid directory services with Entra ID, the Graph API, and its PowerShell implementation.
Photo by Jon Tyson on Unsplash

Photo by Jon Tyson on Unsplash

Automatically terminate OpenSSH sessions

Disconnect OpenSSH user sessions after a certain period of inactivity with the systemd-logind service.
Photo by Rayner Simpson on Unsplash

Photo by Rayner Simpson on Unsplash

Intrusion Detection with OSSEC

The OSSEC free intrusion detection and host-based intrusion prevention system detects and fixes security problems in real time at the operating system level with functions such as log analysis, file integrity checks, Windows registry monitoring, and rootkit detection. It can be deployed virtually anywhere and supports the Linux, Windows, and macOS platforms.
Photo by Andrew Tom on Unsplash

Photo by Andrew Tom on Unsplash

Accelerated and targeted search and find with Ripgrep

Ripgrep combines the best features of tools like Grep, Ack, and Silver Searcher when it comes to using search patterns in a terminal window.
Lead Image © Tatiana Venkova, 123RF.com

Lead Image © Tatiana Venkova, 123RF.com

What's your status (page)?

Businesses with modern IT infrastructures can keep track of internal and external servers and services with black box monitoring by Monitoror, Vigil, and Statping-ng.
Lead Image © Oleksandr Omelchenko, 123RF.com

Lead Image © Oleksandr Omelchenko, 123RF.com

Link Encryption with MACsec

MACsec encrypts defined links with high performance and secures Layer 2 protocols between client and switch or between two switches.
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs



Support Our Work

ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.

Learn More”>
	</a>

<hr>		    
			</div>
		    		</div>

		<div class=