Articles

Photo by Soner Eker on Unsplash

Photo by Soner Eker on Unsplash

Detecting and analyzing man-in-the-middle attacks

Wireshark and a combination of tools comprehensively analyze your security architecture.
Photo by Mohamed Shaffaf on Unsplash

Photo by Mohamed Shaffaf on Unsplash

New features in Windows Terminal Preview

Windows Terminal Preview comes with interesting new features, such as state-preserving quick windows access via shortcuts and configuration of almost all settings in a GUI, which is reason enough to take a look at the preview.
Lead Image © Lucy Baldwin, 123RF.com

Lead Image © Lucy Baldwin, 123RF.com

Stretching devices with limited resources

Compressed memory solutions for small memory problems.
Photo by Artem Bryzgalov on Unsplash

Photo by Artem Bryzgalov on Unsplash

Attack and defense techniques

The MITRE ATT&CK and D3FEND knowledge databases provide useful techniques for securing your IT infrastructure.
Photo by Ian Taylor on Unsplash

Photo by Ian Taylor on Unsplash

Create secure simple containers with the systemd tools Nspawnd and Portabled

Systemd comes with two functions for container management that allow many programs to run more securely through isolation.
Lead Image © Davorr, Fotolia.com

Lead Image © Davorr, Fotolia.com

Workspace ONE for endpoint management

VMware Workspace ONE provides a secure and user-friendly digital workplace. We look at the features, components, and architecture of Workspace ONE, as well as application management and simplification of the integration of end devices through user self-enrollment.
Photo by Ilya lix on Unsplash

Photo by Ilya lix on Unsplash

Configuring X Window input and output devices

Two command-line tools, xandr and xinput, let you optimize your X Window display from the terminal.
Photo by Jack Dong on Unsplash

Photo by Jack Dong on Unsplash

Zero Trust as a security strategy

Acceptance of zero trust models like BeyondCorp by Google or LISA by Netflix lags in Europe, where endpoint security is king. We examine why this situation must change by looking into the principles of modern zero trust concepts.

Harden services with systemd

Systemd comes with a metric for determining the security of your system, letting you track how any service can be secured step-by-step in a sandbox.
Lead Image © Galina Peshkova, 123RF.com

Lead Image © Galina Peshkova, 123RF.com

Endpoint Security for Windows 10

Windows 10, build 21H1, has numerous protection mechanisms out of the box. We look at the option for delaying updates, the components and features of Microsoft Defender, and recommendations for hardening the operating system.
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs



Support Our Work

ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.

Learn More”>
	</a>

<hr>		    
			</div>
		    		</div>

		<div class=