Articles
An exclusive interview with openSUSE Chairman Richard Brown
Over the course of three days of SUSECON, we talked to Richard Brown, the friendly chairperson of the openSUSE Board.
Designate provides DNS as a Service in OpenStack
The management of DNS entries works fundamentally differently for clouds than for classic setups; OpenStack Designate is a meaningful and well-functioning DNS as a Service implementation.
Putting an Active Directory domain controller in the Azure cloud
Once you start putting services in Azure cloud, you might want to add an Active Directory domain controller.
SDS configuration and performance
Software-defined storage promises centrally managed, heterogeneous storage with built-in redundancy. We examine how complicated it is to set up the necessary distributed filesystems. A benchmark shows which operations each system is best at tackling.
Segmenting networks with VLANs
Network virtualization takes very different approaches at the software and hardware levels to divide or group network resources into logical units independent of the physical layer. It is typically a matter of implementing secure strategies. We show the technical underpinnings of VLANs.
Ubuntu 16.04 LTS as an ownCloud server
Locally hosted collaboration servers are an alternative to letting employees swap files in a public cloud. We show you how to set up an ownCloud 9 environment on Ubuntu 16.04 LTS.
Finally: Java 9
Java 9 tempts programmers with innovations intended to facilitate the development and operation of Java applications.
Discover ransomware with PowerShell
Simple backup strategies cannot protect files encrypted by ransomware, because they can be affected as well. A PowerShell script can ensure that your files are okay before sending them to backup.
Application Monitoring with openITCOCKPIT
A good monitoring solution must provide information about applications and their performance. We show you how to monitor a database using openITCOCKPIT.
Halting the ransomware blackmail wave
In the tsunami of ransomware infections this year, the Locky encryption trojan is a high-water mark. With a constant stream of novel attack patterns, this continually evolving pest makes life difficult for IT managers, users, and security vendors. Here's how to protect yourself.
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Most Popular
Support Our Work
ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.