Articles

Lead Image © Cornelius, Fotolia.com

Lead Image © Cornelius, Fotolia.com

Linux apps on Windows 10 and Chrome OS

Microsoft and Google have upgraded their in-house operating systems, Windows 10 and Chrome OS, with subsystems to run Linux. We look into their highly different approaches.
Lead Image © bowie15 , 123RF.com

Lead Image © bowie15 , 123RF.com

Docker and Podman environments on Windows and Mac machines

Develop container applications on a Windows or Mac system with Docker Desktop or Podman.
Photo by nikko osaka on Unsplash

Photo by nikko osaka on Unsplash

Keeping container updates under control

Some application developers try to handle containerized applications as if they were conventional monoliths, but managing updates and security patches in containers needs a totally different approach.
Photo by Pablo Heimplatz on Unsplash

Photo by Pablo Heimplatz on Unsplash

Server update with Azure Update Management

Microsoft Azure Update Management automatically patches servers in on-premises data centers, virtual servers on Azure and other cloud services, and even Linux servers.
Lead Image © bowie15, 123RF.com

Lead Image © bowie15, 123RF.com

Collecting application logfiles with Kubernetes

Modern scale-out environments with containers make log collection difficult. We present concepts and methods for collecting application logfiles with a sidecar container in Kubernetes environments.
Photo by Filip Mroz on Unsplash

Photo by Filip Mroz on Unsplash

Bpytop command-line monitoring tool

The bpytop command-line monitoring tool provides a variety of information via a fancy user interface and supports network monitoring and mouse- or keyboard-based control.
Lead Image © Amy Walters, 123RF.com

Lead Image © Amy Walters, 123RF.com

Hardening network services with DNS

The Domain Name System, in addition to assigning IP addresses, lets you protect the network communication of servers in a domain. DNS offers further hardening of network protocols – in particular, SSH fingerprinting and CAA records.
Lead Image © Jeff Metzger, 123RF.com

Lead Image © Jeff Metzger, 123RF.com

Hardware-enhanced security

Nitrokey hardware authentication devices aim to raise data encryption, key management, and user authentication security to the next level.
Photo by Simon Moog on Unsplash

Photo by Simon Moog on Unsplash

Secure email communication

DMARC combines the abilities of SPF and DKIM to safeguard and protect against spam and phishing and allows targeted configuration according to company policy.
Photo by Glen Carrie on Unsplash

Photo by Glen Carrie on Unsplash

eSIMs in the enterprise

In this overview, we look at the opportunities eSIM technology offers for the mobile workplace and what IT managers need to watch out for in deployment and management.
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs



Support Our Work

ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.

Learn More”>
	</a>

<hr>		    
			</div>
		    		</div>

		<div class=