Articles

Lead Image © Jenzig, photocase.com

Lead Image © Jenzig, photocase.com

Ansible as an alternative to the Puppet configuration tool

Automation is part of life in the data center, and Puppet is commonly regarded as the King of the Hill, but some users prefer the lean alternative Ansible.
Lead Image © Wayne Daniels, 123RF.com

Lead Image © Wayne Daniels, 123RF.com

Web-based reconnaissance

The recon-ng web reconnaissance framework is an important tool in penetration testing.
Lead Image © maridav, 123RF.com

Lead Image © maridav, 123RF.com

The SDFS deduplicating filesystem

Deduplicating filesystems like SDFS store redundant data, such as that created by backups, only once, thereby saving valuable disk space. Additionally, the filesystem can distribute the data to be stored across multiple computer nodes.
Lead Image © Raman Maisei, 123RF.com

Lead Image © Raman Maisei, 123RF.com

Develop your own scripts for Nmap

Nmap does a great job with standard penetration testing tasks, but for specific security analyses, you will want to develop your own test scripts. The Nmap Scripting Engine makes this possible.
Lead Image © Galina Peshkova, 123RF.com

Lead Image © Galina Peshkova, 123RF.com

Setting up Google Apps for Work

We show how to set up Google Apps for Work and how to configure them for company use.
Lead Image © Jason Murillo, 123RF.com

Lead Image © Jason Murillo, 123RF.com

VM and cloud management with openQRM

OpenQRM is a web-based, open source, data center management and cloud platform that offers many popular Linux tools with no major configuration overhead. We show you how to use it.
Lead Image © Heiko Küverling, 123RF.com

Lead Image © Heiko Küverling, 123RF.com

Using the MQTT IoT protocol for unusual but useful purposes

Although the MQTT protocol is usually associated with the Internet of Things, it also works in some very different situations, such as monitoring, for example.
Lead Image © Ulrich M ller, 123RF.com

Lead Image © Ulrich M ller, 123RF.com

Magnum: Exploring OpenStack's Container API

The Magnum project brings Docker container technology to the OpenStack cloud.
Lead Image © Sergey Nivens, 123RF.com

Lead Image © Sergey Nivens, 123RF.com

Improving Docker security now and in the future

The focus for container solutions such as Docker is increasingly shifting to security. Some vulnerabilities have been addressed, with plans to take further steps in the future to secure container virtualization.
Lead Image © Maksim Kabakou, 123RF.com

Lead Image © Maksim Kabakou, 123RF.com

Build secure IoT applications with open source

We look at some common sense tips and open source tools for securing IoT devices.
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs



Support Our Work

ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.

Learn More”>
	</a>

<hr>		    
			</div>
		    		</div>

		<div class=