Articles
Supercharge your software upgrade routine
Topgrade steps forward as the hero to help you keep an upper hand over updating and upgrading your stable of Linux applications.
Managing GPT-4 on the Network
Now that Microsoft has integrated its GPT-4-based AI chat functions directly into the operating system with Windows Copilot, which now includes Bing Chat and Bing Chat Enterprise, you might want to know how to control or even block its use on the network.
Setting up secure RDP connections
Know when to make RDP available on the Internet for remote access to Windows Server and how to configure connections securely when you do.
Flexible backup for large-scale environments
Bacula is a powerful open source backup solution for large environments that offers automation, extension modules, and commercial support.
Managing infrastructure as code with Spacelift
The Spacelift infrastructure-as-code management platform quickly rolls out complete setups to the cloud, minimizing the possibility of failure and problems.
Manage status messages in CouchDB with MapReduce
CouchDB offers numerous interesting features for acquisition and filtering of status messages that make it a fast and convenient data storage solution.
Zero trust planning and implementation
The many facets of the zero trust implementation process can be a source of frustration, which is why we offer a step-by-step guide to implementing zero trust models to help you make state-of-the-art IT security become a reality.
Run rootless Podman containers as systemd services
Running rootless containers is easy with Podman. With Podman Quadlet files, these containers are seamlessly integrated into systemd services.
Web applications with Julia
The technical programming language Julia is fast becoming a favorite with scientists and engineers of all stripes, but it is also well suited to form the backbone of interactive websites that explain these science and engineering concepts.
File Integrity Checks with AIDE
If an attacker gains access to systems by working around your defenses, you need to discover the attacker's tracks in good time, at least to mitigate the further risk of damage. We show you how to monitor changes to files with the Linux AIDE tool.
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Most Popular
Support Our Work
ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.
