Articles

Photo by Damien TUPINIER on Unsplash

Photo by Damien TUPINIER on Unsplash

Load testing with Locust

The Locust load test tool assesses the resiliency of your infrastructure to help you determine whether it can withstand a flood of requests.
Photo by Claudia Soraya on Unsplash

Photo by Claudia Soraya on Unsplash

Remote maintenance and automation with RPort

Firewalls and network address translation often stand in the way of access to remote systems, but the free RPort software works around these obstacles and supports remote maintenance through a tunnel locally, in the cloud, and from your home office.
Photo by Bryan Garces on Unsplash

Photo by Bryan Garces on Unsplash

Filter DNS queries with Blocky

The Domain Name System is repeatedly the target of or is leveraged for attacks on corporate infrastructures; however, it also lets you protect corporate networks against attacks and malware. The Blocky DNS server sets up quickly to secure DNS queries and DNS filtering for corporate networks.
Photo by Kyle Head on Unsplash

Photo by Kyle Head on Unsplash

Exploiting, detecting, and correcting IAM security misconfigurations

Three IAM security misconfiguration scenarios are rather common: allowing the creation of a new policy version, the modification of a role trust policy, and the creation of EC2 instances with role passing. We look at ways to avoid and detect IAM security holes.
Photo by Cytonn Photography on Unsplash

Photo by Cytonn Photography on Unsplash

Tools for automation in the cloud

Automation in the cloud does not require expensive new acquisitions when tools such as Ansible, Salt, Puppet, or Chef are already in use locally and can contribute to the automatic management and orchestration of cloud workloads.
Photo by Austin Neill on Unsplash

Photo by Austin Neill on Unsplash

Configuring complex environments

YAML is often the language of choice when configuring complex environments. We help you get started with YAML and the YAML parser yq.
Photo by Larisa Birta on Unsplash

Photo by Larisa Birta on Unsplash

Convert Linux shell commands into PowerShell cmdlets

Convert Linux shell commands into PowerShell cmdlets and modules and run them in a PowerShell environment.
Lead Image © Nah Ting Feng, 123RF.com

Lead Image © Nah Ting Feng, 123RF.com

Lithnet Password Protection for Active Directory

Lithnet Password Protection for Active Directory provides flexible rules beyond that possible with group policies alone and prevents the use of previously compromised passwords.
Lead Image © Liubomyr Feshchyn, 123rf.com

Lead Image © Liubomyr Feshchyn, 123rf.com

Goodbye cloud VMs, hello laptop VMs

Multipass lets you launch and run Ubuntu virtual machines, use cloud-init to configure the VMs, and prototype cloud launches locally in minutes.
Lead Image © zelfit, 123RF.com

Lead Image © zelfit, 123RF.com

Kubernetes for small and medium-sized enterprises

We look at the benefits of Kubernetes outside of large corporate environments.
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs



Support Our Work

ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.

Learn More”>
	</a>

<hr>		    
			</div>
		    		</div>

		<div class=