Articles

Photo by Toby Elliott on Unsplash

Photo by Toby Elliott on Unsplash

Application-aware batch scheduler

Volcano optimizes high-performance workloads on Kubernetes to avoid deadlocks.
Lead Image © Darko Novakovic, fotolia.com

Lead Image © Darko Novakovic, fotolia.com

Self-hosted Pritunl VPN server with MFA

We give you the ultimate guide to deploying a self-hosted Pritunl VPN server with multifactor authentication.
Photo by Oli Zubenko on Unsplash

Photo by Oli Zubenko on Unsplash

Simplify your migration from Docker to Podman

Podman has become an attractive alternative to Docker, not least because it does not require a central daemon. In this article, we look at how to set about changing the guard and how you can use Podman Desktop to do so.
Lead Image © Andrea De Martin, 123RF.com

Lead Image © Andrea De Martin, 123RF.com

Identify malicious traffic with Maltrail

This traffic analysis software identifies malicious traffic on your network with the use of established sources.
Lead Image © Russell Shively, 123RF.com

Lead Image © Russell Shively, 123RF.com

Denial of service defense

Slowloris can help you harden your web servers against denial-of-service attacks that restrict the availability of web services.
Photo by Toa Heftiba on Unsplash

Photo by Toa Heftiba on Unsplash

Open source ticket system

OTOBO is a user-friendly and completely free ticket system designed to handle complex service requirements that offers an alternative, easy-to-use support tool with Active Directory integration and single sign-on. We show you how to set up and configure OTOBO and how to connect it to third-party systems such as Entra ID.
Photo by Marten Newhall on Unsplash

Photo by Marten Newhall on Unsplash

Remote Access with Tactical RMM

The Tactical RMM open source tool offers a combination of remote monitoring and management, with agents to support Linux, macOS, and Windows.
Photo by The New York Public Library on Unsplash

Photo by The New York Public Library on Unsplash

Centrally manage configuration files

The GNU Stow tool in combination with Ansible can help you manage configuration files.
Lead Image © berkay08, 123RF.com

Lead Image © berkay08, 123RF.com

Passwords, passphrases, and passkeys

Many rules for secure passwords pose major obstacles for unsuspecting users. We investigate how meaningful rigid guidelines are, restate how important passphrases and passkeys are becoming, and offer two recommendations for team-capable password management.
Photo by Kelly Sikkema on Unsplash

Photo by Kelly Sikkema on Unsplash

Processing the new sudo logging format

We present an example that shows how syslog-ng uses the new logging format of the sudo tool to process sudo messages.
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs



Support Our Work

ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.

Learn More”>
	</a>

<hr>		    
			</div>
		    		</div>

		<div class=