Articles

Lead Image © shutter999, 123RF.com

Lead Image © shutter999, 123RF.com

Hardening SSH authentication to the max

Public key authentication further supplemented with one-time password or hardware authentication methods improves SSH security while offering genuine convenience.
Lead Image © Goran Bogicevic, Fotolia.com

Lead Image © Goran Bogicevic, Fotolia.com

Production-ready mini-Kubernetes installations

Kubernetes can be highly complex, with massive setup routines that are totally over the top for newcomers. If you want to try out Kubernetes or run it in production, you have a number of options, even if you decide not to use the comprehensive packages from established vendors.
Lead Image ©pakhnyushchyy, 123RF.com

Lead Image ©pakhnyushchyy, 123RF.com

Networking strategies for Linux on Azure

We explore advanced networking strategies tailored for Linux workloads on Azure.

Manage and automate networks

The StackStorm open source platform helps admins manage networks efficiently by automating repetitive tasks and responding to events in real time.
Photo by Conner Baker on Unsplash

Photo by Conner Baker on Unsplash

Operating large language models in-house

An internal AI server is an interesting way to retain data sovereignty. We show you how to set up an in-house AI server on your hardware and use it in parallel with AI services such as ChatGPT in the cloud.
Lead Image © meepiangraphic, 123RF.com

Lead Image © meepiangraphic, 123RF.com

Snapshot management for Azure VMs

Microsoft recommends the use of snapshots both locally and for Azure VMs. We describe how to create snapshots in the Azure GUI and with PowerShell and how to protect your snapshots against unauthorized access.
Photo by Gustavo Xavier on Unsplash

Photo by Gustavo Xavier on Unsplash

Intelligent observability with AI and Coroot

In the deep waters of scalable environments, observability is more important than ever. Coroot enters the scene with eBPF to intercept traffic and collect data that is of interest for monitoring and attack detection.

Develop a simple scanning application with the NAPS2 SDK

A NAPS2 PDF scanner, the C# language, and the .NET Framework set the stage for a CLI app for scanning documents.
Lead Image © Kirill Makarov, 123RF.com

Lead Image © Kirill Makarov, 123RF.com

Comparing system rescue distros

Rescue systems play a particularly important role for desktops because they cannot simply be reinstalled on the fly. We look at venerable but outdated Knoppix and three still in development: Grml, SystemRescue, and Finnix.
Photo by Barnabas Davoti on Unsplash

Photo by Barnabas Davoti on Unsplash

File access optimization discovery and visualization

File I/O is a limiting factor for many applications and can become a bottleneck for data-intensive computing. We analyze different file access functions and present a script that visualizes and optimizes inefficient file I/O.
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs



Support Our Work

ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.

Learn More”>
	</a>

<hr>		    
			</div>
		    		</div>

		<div class=