Articles

Photo by Kenneth Berrios Alvarez on Unsplash

Photo by Kenneth Berrios Alvarez on Unsplash

Response automation with Shuffle

The concept of security orchestration, automation, and response (SOAR) is increasingly important in IT security to counter ever-growing threats. We introduce Shuffle, a tool that lets you define automated workflows that boost infrastructure security.
Lead Image © Oleksandr Omelchenko, 123RF.com

Lead Image © Oleksandr Omelchenko, 123RF.com

Link Encryption with MACsec

MACsec encrypts defined links with high performance and secures Layer 2 protocols between client and switch or between two switches.
Lead Image © Peapop, Fotolia.com

Lead Image © Peapop, Fotolia.com

Low-code development with Microsoft Power Apps

If the IT staff is having trouble keeping up with the demand for custom applications, end users can pitch in with low-code programming tools like Microsoft Power Apps.
Photo by Andrew Tom on Unsplash

Photo by Andrew Tom on Unsplash

Accelerated and targeted search and find with Ripgrep

Ripgrep combines the best features of tools like Grep, Ack, and Silver Searcher when it comes to using search patterns in a terminal window.
Lead Image © Valentyn Ihnatkin, 123RF.com

Lead Image © Valentyn Ihnatkin, 123RF.com

Incident response with Velociraptor

The software incarnation of the feared predator in the Jurassic Park movies has been on the hunt for clues to cyberattacks and indicators of compromise. We show you how to tame the beast and use it for your own purposes.
Photo by Adam Bixby on Unsplash

Photo by Adam Bixby on Unsplash

Native serverless computing in Kubernetes

Knative transfers serverless workloads to Kubernetes and provides all the container components you need to build serverless applications and PaaS and FaaS services.
Photo by Dan Dennis on Unsplash

Photo by Dan Dennis on Unsplash

Sharding and scale-out for databases

Apache ShardingSphere extends databases like MySQL or PostgreSQL, adding a modular abstraction layer to support horizontal sharding and scalability – but not replication or encryption at rest.
Lead Image © Tatiana Venkova, 123RF.com

Lead Image © Tatiana Venkova, 123RF.com

What's your status (page)?

Businesses with modern IT infrastructures can keep track of internal and external servers and services with black box monitoring by Monitoror, Vigil, and Statping-ng.
Lead Image © Sebastian Duda, 123RF.com

Lead Image © Sebastian Duda, 123RF.com

Build and host Docker images

When facing the challenge of packaging your application in a container, take into account your needs in terms of handling and security and investigate sensible options for hosting your own registry.
Photo by Kelly Sikkema on Unsplash

Photo by Kelly Sikkema on Unsplash

Recovering from a cyberattack in a hybrid environment

Restoring identity is an important part of disaster recovery, since it lays the foundation for restoring normality and regular operations. We look into contingency measures for hybrid directory services with Entra ID, the Graph API, and its PowerShell implementation.
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs



Support Our Work

ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.

Learn More”>
	</a>

<hr>		    
			</div>
		    		</div>

		<div class=