Articles

Lead Image © blas, Fotolia.com

Lead Image © blas, Fotolia.com

Tools for hardware diagnostics under Windows

We look at one Windows on-board tool, five free tools, and a commercial tool to discover hardware installed on a Windows computer and determine whether it is still working properly.
Lead Image © James Thew, Fotolia.com

Lead Image © James Thew, Fotolia.com

Purdue Model for industrial networking

The Purdue Model maps the challenges of networking industrial systems to five levels, helping to target and mitigate risk and address vulnerabilities. We look at the Purdue Model in detail, investigate an implementation tool, and explain the role of zero trust.
Lead Image © rudall30, 123RF.com

Lead Image © rudall30, 123RF.com

File Integrity Checks with AIDE

If an attacker gains access to systems by working around your defenses, you need to discover the attacker's tracks in good time, at least to mitigate the further risk of damage. We show you how to monitor changes to files with the Linux AIDE tool.
Lead Image © Kittipong Jirasukhanont, 123RF.com

Lead Image © Kittipong Jirasukhanont, 123RF.com

Explore automation-as-code with Ansible

The Ansible automation tool makes it really easy to implement IT scenarios as code. We use structured YAML code to roll out Ansible in the form of AWX.
Lead Image © Vladimir Nenov, 123RF.com

Lead Image © Vladimir Nenov, 123RF.com

Storage across the network with iSCSI and Synology DiskStation Manager

The iSCSI protocol lets you access block storage across a network connection. We show you how to connect a Debian 12 system with a Synology storage device over iSCSI.
Photo by ROCCO STOPPOLONI on Unsplash

Photo by ROCCO STOPPOLONI on Unsplash

Getting your virtual machine dimensions right

Massive, performance-hungry VMs require proper handling to meet their dynamic requirements. We give you some rules to help size these monsters properly.
Photo by Ray Hennessy on Unsplash

Photo by Ray Hennessy on Unsplash

Migrate your Git repositories to Gitea

Nothing is forever, not even a Git server. After the purchase of GitHub by Microsoft, I found a new home in Gitea for version control.
Photo by Sander Sammy on Unsplash

Photo by Sander Sammy on Unsplash

Reducing the Attack Surface in Windows

The sum total of all possible points of attack can be defined as the attack surface, and you need to take every opportunity to minimize it to the extent possible. Windows has built-in rules that minimize the attack surface; they simply need to be enabled.
Lead Image © iofoto, Fotolia.com

Lead Image © iofoto, Fotolia.com

Data deduplication on Windows Server 2022

Data deduplication tools boost efficiency in storage management by improving storage utilization and saving network bandwidth during backup and replication processes.
Lead Image © rawintanpin, 123RF.com

Lead Image © rawintanpin, 123RF.com

Integrate remote cloud storage

You don't need native clients for every single service just to back up or synchronize your data in the cloud; Rclone helps you handle these tasks for multiple cloud accounts at the command line or in a graphical front end.
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs



Support Our Work

ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.

Learn More”>
	</a>

<hr>		    
			</div>
		    		</div>

		<div class=