Articles
Simplify your migration from Docker to Podman
Podman has become an attractive alternative to Docker, not least because it does not require a central daemon. In this article, we look at how to set about changing the guard and how you can use Podman Desktop to do so.
Identify malicious traffic with Maltrail
This traffic analysis software identifies malicious traffic on your network with the use of established sources.
Denial of service defense
Slowloris can help you harden your web servers against denial-of-service attacks that restrict the availability of web services.
Open source ticket system
OTOBO is a user-friendly and completely free ticket system designed to handle complex service requirements that offers an alternative, easy-to-use support tool with Active Directory integration and single sign-on. We show you how to set up and configure OTOBO and how to connect it to third-party systems such as Entra ID.
Remote Access with Tactical RMM
The Tactical RMM open source tool offers a combination of remote monitoring and management, with agents to support Linux, macOS, and Windows.
Centrally manage configuration files
The GNU Stow tool in combination with Ansible can help you manage configuration files.
Passwords, passphrases, and passkeys
Many rules for secure passwords pose major obstacles for unsuspecting users. We investigate how meaningful rigid guidelines are, restate how important passphrases and passkeys are becoming, and offer two recommendations for team-capable password management.
Processing the new sudo logging format
We present an example that shows how syslog-ng uses the new logging format of the sudo tool to process sudo messages.
Designing a Secure Active Directory
Many experienced administrators find that Active Directory is particularly problematic in terms of security. We reflect on the secure design, rigorous hardening, and security-conscious management of this service.
Operating system images with bootc
The bootc project lets you use a container-based workflow to create bootable operating system images. In a few simple steps, we show you how to use Podman to create ready-to-run images.
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Most Popular
Support Our Work
ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.










