Articles

Photo by Claudio Schwarz on Unsplash

Photo by Claudio Schwarz on Unsplash

RFID technologies and risks

We look at various approaches to RFID asset tracking, provide an understanding of the technologies and challenges involved, and cover some of the potential attack vectors.
Lead Image © Akurhan, 123RF.com

Lead Image © Akurhan, 123RF.com

Manage software apps publicly and privately

The WinGet client for the Windows Package Manager improves the software installation experience for administrators, developers, and users and provides a way to create and share software in the WinGet package format for publishing to public and private repos.
Photo by Nils Bouillard on Unsplash

Photo by Nils Bouillard on Unsplash

Flexible backup for large-scale environments

Bacula is a powerful open source backup solution for large environments that offers automation, extension modules, and commercial support.
Photo by redcharlie on Unsplash

Photo by redcharlie on Unsplash

Supercharge your software upgrade routine

Topgrade steps forward as the hero to help you keep an upper hand over updating and upgrading your stable of Linux applications.
Lead Image © Konstantin Shaklein, 123RF.com

Lead Image © Konstantin Shaklein, 123RF.com

Managing infrastructure as code with Spacelift

The Spacelift infrastructure-as-code management platform quickly rolls out complete setups to the cloud, minimizing the possibility of failure and problems.
Lead Image © balein, 123RF.com

Lead Image © balein, 123RF.com

Kubernetes networking in the kernel

Cilium and eBPF put Kubernetes networking down in the kernel where it belongs.
Photo by Cécile Brasseur on Unsplash

Photo by Cécile Brasseur on Unsplash

Managing GPT-4 on the Network

Now that Microsoft has integrated its GPT-4-based AI chat functions directly into the operating system with Windows Copilot, which now includes Bing Chat and Bing Chat Enterprise, you might want to know how to control or even block its use on the network.
Lead Image © Juri Samsonov, Fotolia.com

Lead Image © Juri Samsonov, Fotolia.com

Mocking and emulating AWS and GCP services

Mock and emulate AWS services locally and use official Google Cloud Platform service emulators to unblock development and operations – all without paying a dime.
Lead Image © asphoto777, 123RF.com

Lead Image © asphoto777, 123RF.com

Setting up secure RDP connections

Know when to make RDP available on the Internet for remote access to Windows Server and how to configure connections securely when you do.
Lead Image © magiceyes, 123RF.com

Lead Image © magiceyes, 123RF.com

Zero trust planning and implementation

The many facets of the zero trust implementation process can be a source of frustration, which is why we offer a step-by-step guide to implementing zero trust models to help you make state-of-the-art IT security become a reality.
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs



Support Our Work

ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.

Learn More”>
	</a>

<hr>		    
			</div>
		    		</div>

		<div class=